A cleartext storage of sensitive information vulnerability in Palo Alto Networks Expedition allows an authenticated attacker to reveal firewall usernames, passwords, and API keys generated using those credentials.
Solution:
Workaround:
The product writes sensitive information to a log file.
The product stores sensitive information in cleartext within a resource that might be accessible to another control sphere.
Link | Tags |
---|---|
https://security.paloaltonetworks.com/PAN-SA-2024-0010 | mitigation vendor advisory |
https://www.horizon3.ai/attack-research/palo-alto-expedition-from-n-day-to-full-compromise/ | exploit |