An information exposure through log file vulnerability exists in Palo Alto Networks PAN-OS software where the connection details for a scheduled configuration export are logged in system logs. Logged information includes the cleartext username, password, and IP address used to export the PAN-OS configuration to the destination server.
Solution:
This entry has been deprecated because its abstraction was too low-level. See CWE-532.
The product writes sensitive information to a log file.
Link | Tags |
---|---|
https://security.paloaltonetworks.com/CVE-2021-3037 | vendor advisory |