First published: Wed Apr 14 2021(Updated: )
An information exposure through log file vulnerability exists in Palo Alto Networks PAN-OS software where secrets in PAN-OS XML API requests are logged in cleartext to the web server logs when the API is used incorrectly. This vulnerability applies only to PAN-OS appliances that are configured to use the PAN-OS XML API and exists only when a client includes a duplicate API parameter in API requests. Logged information includes the cleartext username, password, and API key of the administrator making the PAN-OS XML API request.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Paloaltonetworks Pan-os | >=8.1.0<8.1.19 | |
Paloaltonetworks Pan-os | >=9.0.0<9.0.12 | |
Paloaltonetworks Pan-os | >=9.1.0<9.1.6 | |
Paloaltonetworks Pan-os | >=10.0.0<10.0.1 |
This issue is fixed in PAN-OS 8.1.19, PAN-OS 9.0.12, PAN-OS 9.1.6, PAN-OS 10.0.1, and all later PAN-OS versions. After you upgrade the PAN-OS appliance, you must change the passwords and generate a new API key for all impacted PAN-OS administrators.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-3036 is an information exposure through log file vulnerability in Palo Alto Networks PAN-OS software.
CVE-2021-3036 has a severity rating of 4.4, which is considered medium.
CVE-2021-3036 affects Palo Alto Networks PAN-OS software versions 8.1.0 to 8.1.19, 9.0.0 to 9.0.12, 9.1.0 to 9.1.6, and 10.0.0 to 10.0.1.
CVE-2021-3036 vulnerability occurs when secrets in PAN-OS XML API requests are logged in cleartext to the web server logs due to incorrect usage of the API.
Yes, Palo Alto Networks has released patches to address the vulnerability. It is recommended to update to the latest version of PAN-OS software.