Palo Alto Networks Security Advisories / CVE-2023-0005

CVE-2023-0005 PAN-OS: Exposure of Sensitive Information Vulnerability

Severity 4.1 · MEDIUM
Attack Vector LOCAL
Attack Complexity HIGH
Confidentiality Impact HIGH
Privileges Required HIGH
Integrity Impact NONE
User Interaction NONE
Availability Impact NONE


A vulnerability in Palo Alto Networks PAN-OS software enables an authenticated administrator to expose the plaintext values of secrets stored in the device configuration and encrypted API keys.

Product Status

Cloud NGFW NoneAll
PAN-OS 11.0NoneAll
PAN-OS 10.2< 10.2.3>= 10.2.3
PAN-OS 10.1< 10.1.8>= 10.1.8
PAN-OS 10.0< 10.0.12>= 10.0.12
PAN-OS 9.1< 9.1.15>= 9.1.15
PAN-OS 9.0< 9.0.17>= 9.0.17
PAN-OS 8.1< 8.1.24>= 8.1.24
Prisma Access NoneAll

Severity: MEDIUM

CVSSv3.1 Base Score: 4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N)

Exploitation Status

Palo Alto Networks is not aware of any malicious exploitation of this issue. However, a proof of concept script for this issue is publicly available.

Weakness Type

CWE-497: Exposure of Sensitive System Information to an Unauthorized Control Sphere


This issue is fixed in PAN-OS 8.1.24, PAN-OS 9.0.17, PAN-OS 9.1.15, PAN-OS 10.0.12, PAN-OS 10.1.8, PAN-OS 10.2.3, and all later PAN-OS versions.

Workarounds and Mitigations

This issue requires the attacker to have authenticated access to the PAN-OS management interface. You can mitigate the impact of this issue by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation at


Palo Alto Networks thanks the security researcher rqu for discovering and reporting this issue.


Initial publication
© 2024 Palo Alto Networks, Inc. All rights reserved.