CVE-2021-3039

Published Jun 10, 2021

Last updated 3 years ago

Overview

Description
An information exposure through log file vulnerability exists in the Palo Alto Networks Prisma Cloud Compute Console where a secret used to authorize the role of the authenticated user is logged to a debug log file. Authenticated Operator role and Auditor role users with access to the debug log files can use this secret to gain Administrator role access for their active session in Prisma Cloud Compute. Prisma Cloud Compute SaaS versions were automatically upgraded to the fixed release. This issue impacts all Prisma Cloud Compute versions earlier than Prisma Cloud Compute 21.04.412.
Source
psirt@paloaltonetworks.com
NVD status
Analyzed

Risk scores

CVSS 3.1

Type
Primary
Base score
3.8
Impact score
2.5
Exploitability score
1.2
Vector string
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N
Severity
LOW

CVSS 2.0

Type
Primary
Base score
5.5
Impact score
4.9
Exploitability score
8
Vector string
AV:N/AC:L/Au:S/C:P/I:P/A:N

Weaknesses

nvd@nist.gov
CWE-532
psirt@paloaltonetworks.com
CWE-532

Social media

Hype score
Not currently trending

Configurations