First published: Wed Aug 11 2021(Updated: )
A cryptographically weak pseudo-random number generator (PRNG) is used during authentication to the Palo Alto Networks PAN-OS web interface. This enables an authenticated attacker, with the capability to observe their own authentication secrets over a long duration on the PAN-OS appliance, to impersonate another authenticated web interface administrator's session. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.19; PAN-OS 9.0 versions earlier than PAN-OS 9.0.14; PAN-OS 9.1 versions earlier than PAN-OS 9.1.10; PAN-OS 10.0 versions earlier than PAN-OS 10.0.4. PAN-OS 10.1 versions are not impacted.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Paloaltonetworks Pan-os | >=8.1.0<8.1.19 | |
Paloaltonetworks Pan-os | >=9.0.0<9.0.14 | |
Paloaltonetworks Pan-os | >=9.1.0<9.1.10 | |
Paloaltonetworks Pan-os | >=10.0.0<10.0.4 |
This issue is fixed in PAN-OS 8.1.19, PAN-OS 9.0.14, PAN-OS 9.1.10, PAN-OS 10.0.4, and all later PAN-OS versions.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-3047 refers to a vulnerability in the Palo Alto Networks PAN-OS web interface where a weak pseudo-random number generator (PRNG) is used during authentication.
The severity of CVE-2021-3047 is medium with a severity value of 3.1.
CVE-2021-3047 allows an authenticated attacker to impersonate other users if they can observe their own authentication secrets over a long duration on the PAN-OS appliance.
CVE-2021-3047 affects Palo Alto Networks PAN-OS versions 8.1.0 to 8.1.19, 9.0.0 to 9.0.14, 9.1.0 to 9.1.10, and 10.0.0 to 10.0.4.
To fix CVE-2021-3047, Palo Alto Networks recommends upgrading to a fixed software release.