Learn about CVE-2021-3037 impacting Palo Alto Networks PAN-OS software, exposing cleartext credentials in system logs during configuration exports. Find mitigation steps and patching details.
An information exposure through log file vulnerability exists in Palo Alto Networks PAN-OS software where the connection details for a scheduled configuration export are logged in system logs. The vulnerability affects PAN-OS versions 8.1, 9.0, 9.1, and prior versions.
Understanding CVE-2021-3037
This CVE discloses sensitive information in system logs, including cleartext credentials used for configuration exports, impacting the confidentiality of the data.
What is CVE-2021-3037?
The vulnerability exposes sensitive connection details like usernames, passwords, and IP addresses in plaintext format within system logs during scheduled configuration exports.
The Impact of CVE-2021-3037
The issue poses a low-severity risk with a CVSS base score of 2.3, mainly affecting the confidentiality of exported configuration data. The attack complexity is low, requiring high privileges for exploitation.
Technical Details of CVE-2021-3037
The vulnerability affects PAN-OS versions 8.1.19, 9.0.13, 9.1.4, and prior versions.
Vulnerability Description
Configuration export connection details are stored in system logs in cleartext, potentially exposing usernames, passwords, and IP addresses.
Affected Systems and Versions
PAN-OS versions 8.1, 9.0, and 9.1 are impacted, including earlier versions.
Exploitation Mechanism
A local attacker with high privileges can exploit this vulnerability to access sensitive information stored in system logs.
Mitigation and Prevention
To address CVE-2021-3037, upgrade PAN-OS devices to versions 8.1.19, 9.0.13, 9.1.4, or later. After updating, change the connection details used for configuration exports and update credentials on the destination server.
Immediate Steps to Take
Upgrade affected PAN-OS devices to the patched versions mentioned above and modify connection details after the upgrade.
Long-Term Security Practices
Regularly monitor system logs for any unauthorized access and enforce strong credential policies for configuration exports.
Patching and Updates
Ensure timely installation of security patches provided by Palo Alto Networks to address vulnerabilities and enhance system security.