CVE-2020-2043 PAN-OS: Passwords may be logged in clear text when using after-change-detail custom syslog field for config logs
Description
An information exposure through log file vulnerability where sensitive fields are recorded in the configuration log without masking on Palo Alto Networks PAN-OS software when the after-change-detail custom syslog field is enabled for configuration logs and the sensitive field appears multiple times in one log entry. The first instance of the sensitive field is masked but subsequent instances are left in clear text.
This issue impacts:
PAN-OS 8.1 versions earlier than PAN-OS 8.1.16;
PAN-OS 9.0 versions earlier than PAN-OS 9.0.10;
PAN-OS 9.1 versions earlier than PAN-OS 9.1.4.
Product Status
Versions | Affected | Unaffected |
---|---|---|
PAN-OS 10.0 | None | >= 10.0.0 |
PAN-OS 9.1 | < 9.1.4 | >= 9.1.4 |
PAN-OS 9.0 | < 9.0.10 | >= 9.0.10 |
PAN-OS 8.1 | < 8.1.16 | >= 8.1.16 |
Required Configuration for Exposure
This issue is only applicable when when the after-change-detail custom syslog field is enabled for config logs.
Severity: LOW
CVSSv3.1 Base Score: 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)
Weakness Type
CWE-532 Information Exposure Through Log Files
Solution
This issue is fixed in PAN-OS 8.1.16, PAN-OS 9.0.10, PAN-OS 9.1.4, and all later PAN-OS versions.
Workarounds and Mitigations
This issue requires access to PAN-OS log files generated in the system. You can mitigate the impact of this issue by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at https://docs.paloaltonetworks.com/best-practices.