CVE-2021-3036
MEDIUM
Published 2021-04-20T03:15:17.198767Z
Actions:
CVSS Score
V3.1
4.4
/10
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
Base Score Metrics
Exploitability: N/A
Impact: N/A
EPSS Score
v2023.03.01
0.000
probability
of exploitation in the wild
There is a 0.0% chance that this vulnerability will be exploited in the wild within the next 30 days.
Updated: 2025-01-25
Exploit Probability
Percentile: 0.149
Higher than 14.9% of all CVEs
Attack Vector Metrics
Impact Metrics
Description
An information exposure through log file vulnerability exists in Palo Alto Networks PAN-OS software where secrets in PAN-OS XML API requests are logged in cleartext to the web server logs when the API is used incorrectly. This vulnerability applies only to PAN-OS appliances that are configured to use the PAN-OS XML API and exists only when a client includes a duplicate API parameter in API requests. Logged information includes the cleartext username, password, and API key of the administrator making the PAN-OS XML API request.
Available Exploits
No exploits available for this CVE.
Related News
No news articles found for this CVE.
Published: 2021-04-20T03:15:17.198767Z
Last Modified: 2024-09-17T04:28:51.940Z
Copied to clipboard!