CVE编号
CVE-2021-3036利用情况
暂无补丁情况
N/A披露时间
2021-04-20漏洞描述
An information exposure through log file vulnerability exists in Palo Alto Networks PAN-OS software where secrets in PAN-OS XML API requests are logged in cleartext to the web server logs when the API is used incorrectly. This vulnerability applies only to PAN-OS appliances that are configured to use the PAN-OS XML API and exists only when a client includes a duplicate API parameter in API requests. Logged information includes the cleartext username, password, and API key of the administrator making the PAN-OS XML API request.解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
https://security.paloaltonetworks.com/CVE-2021-3036 |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
系统 | paloaltonetworks | pan-os | * |
From (including) 10.0.0 |
Up to (excluding) 10.0.1 |
||||
运行在以下环境 | |||||||||
系统 | paloaltonetworks | pan-os | * |
From (including) 8.1.0 |
Up to (excluding) 8.1.19 |
||||
运行在以下环境 | |||||||||
系统 | paloaltonetworks | pan-os | * |
From (including) 9.0.0 |
Up to (excluding) 9.0.12 |
||||
运行在以下环境 | |||||||||
系统 | paloaltonetworks | pan-os | * |
From (including) 9.1.0 |
Up to (excluding) 9.1.6 |
||||
- 攻击路径 本地
- 攻击复杂度 低
- 权限要求 高
- 影响范围 未更改
- 用户交互 无
- 可用性 无
- 保密性 高
- 完整性 无
还没有评论,来说两句吧...