Learn about CVE-2023-6791, a vulnerability in Palo Alto Networks PAN-OS software allowing disclosure of plaintext credentials. Find mitigation steps here.
This CVE-2023-6791 relates to a credential disclosure vulnerability found in Palo Alto Networks PAN-OS software. It allows an authenticated read-only administrator to access plaintext credentials of stored external system integrations via the web interface.
Understanding CVE-2023-6791
This section will provide insights into the nature and impact of CVE-2023-6791.
What is CVE-2023-6791?
The vulnerability in PAN-OS software permits authenticated read-only administrators to retrieve plaintext credentials of integrated systems like LDAP, SCP, RADIUS, TACACS+, and SNMP through the web interface.
The Impact of CVE-2023-6791
With a base severity rating of MEDIUM (CVSS score: 4.9), this vulnerability poses a HIGH confidentiality impact. It requires HIGH privileges, has LOW attack complexity, and can be exploited over a network.
Technical Details of CVE-2023-6791
Delve into the specifics of CVE-2023-6791 to understand its implications fully.
Vulnerability Description
The flaw allows authenticated read-only administrators to extract plaintext credentials from various external system integrations using the PAN-OS web interface.
Affected Systems and Versions
Versions of PAN-OS software below 8.1.24-h1, 9.0.17, 9.1.16, 10.0.12, 10.1.9, 10.2.4, 11.0.1 are affected. Subsequent versions and Prisma Access, and Cloud NGFW are unaffected.
Exploitation Mechanism
This vulnerability requires authenticated access to the PAN-OS web interface for exploitation. No instances of malicious exploitation have been reported by Palo Alto Networks.
Mitigation and Prevention
Explore the measures to mitigate and prevent the impact of CVE-2023-6791.
Immediate Steps to Take
To address the issue, upgrade PAN-OS software to versions 8.1.24-h1, 9.0.17, 9.1.16, 10.0.12, 10.1.9, 10.2.4, or 11.0.1. Subsequently, issue new credentials for the affected external integrations to prevent misuse.
Long-Term Security Practices
Follow best practices outlined in the PAN-OS technical documentation to enhance the overall security of your system, especially regarding administrative access.
Patching and Updates
Ensure timely patching and updates of PAN-OS software to the latest secure versions to safeguard against potential vulnerabilities.
By understanding the intricacies of CVE-2023-6791 and taking necessary precautions, organizations can enhance their cybersecurity posture and protect sensitive information from unauthorized access.