An information exposure through log file vulnerability exists in Palo Alto Networks PAN-OS software where the connection details for a scheduled configuration export are logged in system logs. Logged information includes the cleartext username, password, and IP address used to export the PAN-OS configuration to the destination server.
This entry has been deprecated because its abstraction was too low-level. See CWE-532.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Pan-os | Paloaltonetworks | 8.1.0 (including) | 8.1.19 (excluding) |
Pan-os | Paloaltonetworks | 9.0.0 (including) | 9.0.13 (excluding) |
Pan-os | Paloaltonetworks | 9.1.0 (including) | 9.1.4 (excluding) |