First published: Wed Dec 13 2023(Updated: )
A credential disclosure vulnerability in Palo Alto Networks PAN-OS software enables an authenticated read-only administrator to obtain the plaintext credentials of stored external system integrations such as LDAP, SCP, RADIUS, TACACS+, and SNMP from the web interface.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Palo Alto Networks PAN-OS | >=8.1.0<8.1.24 | |
Palo Alto Networks PAN-OS | >=9.0.0<9.0.17 | |
Palo Alto Networks PAN-OS | >=9.1.0<9.1.16 | |
Palo Alto Networks PAN-OS | >=10.0.0<10.0.12 | |
Palo Alto Networks PAN-OS | >=10.1.0<10.1.9 | |
Palo Alto Networks PAN-OS | >=10.2.0<10.2.4 | |
Palo Alto Networks PAN-OS | =11.0.0 |
This issue is fixed in PAN-OS 8.1.24-h1, PAN-OS 9.0.17, PAN-OS 9.1.16, PAN-OS 10.0.12, PAN-OS 10.1.9, PAN-OS 10.2.4, PAN-OS 11.0.1, and all later PAN-OS versions. You should issue new credentials for the impacted external integrations after you upgrade your PAN-OS software to a fixed version to prevent the misuse of previously exposed credentials.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-6791 is considered a high severity vulnerability due to its potential to expose plaintext credentials of external system integrations.
To fix CVE-2023-6791, you should update your Palo Alto Networks PAN-OS to the latest version that is not affected.
CVE-2023-6791 affects authenticated read-only administrators of Palo Alto Networks PAN-OS versions within specified ranges.
CVE-2023-6791 allows exposure of plaintext credentials for external system integrations like LDAP, SCP, RADIUS, TACACS+, and SNMP.
The disclosure date for CVE-2023-6791 is not specified in the provided information.