CVE-2020-2043 PAN-OS: Passwords may be logged in clear text when using after-change-detail custom syslog field for config logs
An information exposure through log file vulnerability where sensitive fields are recorded in the configuration log without masking on Palo Alto Networks PAN-OS software when the after-change-detail custom syslog field is enabled for configuration logs and the sensitive field appears multiple times in one log entry. The first instance of the sensitive field is masked but subsequent instances are left in clear text.
This issue impacts:
PAN-OS 8.1 versions earlier than PAN-OS 8.1.16;
PAN-OS 9.0 versions earlier than PAN-OS 9.0.10;
PAN-OS 9.1 versions earlier than PAN-OS 9.1.4.
|PAN-OS 10.0||None||>= 10.0.0|
|PAN-OS 9.1||< 9.1.4||>= 9.1.4|
|PAN-OS 9.0||< 9.0.10||>= 9.0.10|
|PAN-OS 8.1||< 8.1.16||>= 8.1.16|
Required Configuration for Exposure
This issue is only applicable when when the after-change-detail custom syslog field is enabled for config logs.
CVSSv3.1 Base Score:3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)
This issue is fixed in PAN-OS 8.1.16, PAN-OS 9.0.10, PAN-OS 9.1.4, and all later PAN-OS versions.
Workarounds and Mitigations
This issue requires access to PAN-OS log files generated in the system. You can mitigate the impact of this issue by following best practices for securing the PAN-OS management interface. Please review the Best Practices for Securing Administrative Access in the PAN-OS technical documentation, available at https://docs.paloaltonetworks.com/best-practices.