Vulnerability Description
An information exposure through log file vulnerability exists in Palo Alto Networks PAN-OS software where secrets in PAN-OS XML API requests are logged in cleartext to the web server logs when the API is used incorrectly. This vulnerability applies only to PAN-OS appliances that are configured to use the PAN-OS XML API and exists only when a client includes a duplicate API parameter in API requests. Logged information includes the cleartext username, password, and API key of the administrator making the PAN-OS XML API request.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Paloaltonetworks | Pan-Os | >= 8.1.0, < 8.1.19 |
Related Weaknesses (CWE)
References
- https://security.paloaltonetworks.com/CVE-2021-3036Vendor Advisory
- https://security.paloaltonetworks.com/CVE-2021-3036Vendor Advisory
FAQ
What is CVE-2021-3036?
CVE-2021-3036 is a vulnerability with a CVSS score of 4.4 (MEDIUM). An information exposure through log file vulnerability exists in Palo Alto Networks PAN-OS software where secrets in PAN-OS XML API requests are logged in cleartext to the web server logs when the API...
How severe is CVE-2021-3036?
CVE-2021-3036 has been rated MEDIUM with a CVSS base score of 4.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-3036?
Check the references section above for vendor advisories and patch information. Affected products include: Paloaltonetworks Pan-Os.