CVE-2021-3036
PAN-OS vulnerability analysis and mitigation

Overview

An information exposure through log file vulnerability (CVE-2021-3036) was discovered in Palo Alto Networks PAN-OS software. The vulnerability affects PAN-OS appliances configured to use the PAN-OS XML API and occurs when a client includes duplicate API parameters in API requests. The issue was discovered by David Tien of Cyber Risk and disclosed on April 14, 2021 (Palo Advisory).

Technical details

The vulnerability allows sensitive information to be logged in cleartext to the web server logs when the API is used incorrectly. The exposed information includes cleartext username, password, and API key of the administrator making the PAN-OS XML API request. The vulnerability has been assigned a CVSS v3.1 Base Score of 4.4 (MEDIUM) with the vector string CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N, indicating local access required with high privileges needed but resulting in high confidentiality impact (Palo Advisory).

Impact

The vulnerability exposes administrator credentials and API keys in cleartext within log files, potentially allowing unauthorized access to administrative functions if the logs are compromised. This could lead to significant security breaches as administrator-level credentials could be extracted from the logs (Palo Advisory).

Mitigation and workarounds

The vulnerability has been fixed in PAN-OS versions 8.1.19, 9.0.12, 9.1.6, 10.0.1, and all later versions. After upgrading the PAN-OS appliance, administrators must change passwords and generate new API keys for all impacted PAN-OS administrators. It is also recommended to confirm that there are no PAN-OS XML API requests that repeat API parameters in the request (Palo Advisory).

Additional resources


SourceThis report was generated using AI

Related PAN-OS vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-4231HIGH8.6
  • PAN-OSPAN-OS
  • cpe:2.3:o:paloaltonetworks:pan-os
NoYesJun 13, 2025
CVE-2025-4230HIGH8.4
  • PAN-OSPAN-OS
  • cpe:2.3:o:paloaltonetworks:pan-os
NoYesJun 13, 2025
CVE-2025-4615HIGH7
  • PAN-OSPAN-OS
  • cpe:2.3:o:paloaltonetworks:pan-os
NoYesOct 09, 2025
CVE-2025-4614MEDIUM4.8
  • PAN-OSPAN-OS
  • cpe:2.3:o:paloaltonetworks:pan-os
NoYesOct 09, 2025
CVE-2025-0137MEDIUM4.8
  • PAN-OSPAN-OS
  • cpe:2.3:o:paloaltonetworks:pan-os
NoYesMay 14, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management