
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability in Palo Alto Networks PAN-OS software (CVE-2023-0005) was discovered that enables an authenticated administrator to expose the plaintext values of secrets stored in the device configuration and encrypted API keys. The vulnerability was disclosed on April 12, 2023, affecting multiple versions of PAN-OS including versions 10.2, 10.1, 10.0, 9.1, 9.0, and 8.1 (Palo Alto Advisory).
The vulnerability has been assigned a CVSS v3.1 Base Score of 4.1 (MEDIUM) with the following metrics: Attack Vector: LOCAL, Attack Complexity: HIGH, Privileges Required: HIGH, User Interaction: NONE, Scope: UNCHANGED, Confidentiality Impact: HIGH, Integrity Impact: NONE, Availability Impact: NONE. The weakness type is classified as CWE-497: Exposure of Sensitive System Information to an Unauthorized Control Sphere (Palo Alto Advisory).
The vulnerability allows exposure of sensitive information, specifically the plaintext values of secrets stored in the device configuration and encrypted API keys. This could potentially lead to unauthorized access to sensitive system information (Palo Alto Advisory).
The vulnerability has been fixed in PAN-OS versions 8.1.24, 9.0.17, 9.1.15, 10.0.12, 10.1.8, 10.2.3, and all later PAN-OS versions. As a mitigation measure, organizations are advised to follow best practices for securing the PAN-OS management interface. Detailed guidance can be found in the Best Practices for Securing Administrative Access in the PAN-OS technical documentation (Palo Alto Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."