René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

202 lines
7.8 KiB
JSON

{
"id": "CVE-2021-3031",
"sourceIdentifier": "psirt@paloaltonetworks.com",
"published": "2021-01-13T18:15:14.603",
"lastModified": "2022-10-27T12:51:30.810",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Padding bytes in Ethernet packets on PA-200, PA-220, PA-500, PA-800, PA-2000 Series, PA-3000 Series, PA-3200 Series, PA-5200 Series, and PA-7000 Series firewalls are not cleared before the data frame is created. This leaks a small amount of random information from the firewall memory into the Ethernet packets. An attacker on the same Ethernet subnet as the PAN-OS firewall is able to collect potentially sensitive information from these packets. This issue is also known as Etherleak and is detected by security scanners as CVE-2003-0001. This issue impacts: PAN-OS 8.1 version earlier than PAN-OS 8.1.18; PAN-OS 9.0 versions earlier than PAN-OS 9.0.12; PAN-OS 9.1 versions earlier than PAN-OS 9.1.5."
},
{
"lang": "es",
"value": "Los bytes de relleno en los paquetes Ethernet en los firewalls PA-200, PA-220, PA-500, PA-800, PA-2000 Series, PA-3000 Series, PA-3200 Series, PA-5200 Series y PA-7000 Series, no son borrados antes de que se cree la trama de datos. Esto filtra una peque\u00f1a cantidad de informaci\u00f3n aleatoria de la memoria del firewall para los paquetes Ethernet. Un atacante en la misma subred Ethernet que el firewall PAN-OS puede recopilar informaci\u00f3n potencialmente confidencial de estos paquetes. Este problema tambi\u00e9n se conoce como Etherleak y los esc\u00e1neres de seguridad lo detectan como CVE-2003-0001. Este problema afecta: PAN-OS 8.1 versiones anteriores a PAN-OS 8.1.18; PAN-OS 9.0 versiones anteriores a PAN-OS 9.0.12; PAN-OS 9.1 versiones anteriores a PAN-OS 9.1.5."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@paloaltonetworks.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N",
"accessVector": "ADJACENT_NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3
},
"baseSeverity": "LOW",
"exploitabilityScore": 6.5,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-212"
}
]
},
{
"source": "psirt@paloaltonetworks.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.1.0",
"versionEndExcluding": "8.1.18",
"matchCriteriaId": "33293775-DC4C-41E0-89CD-B15F4B73D130"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.0.0",
"versionEndExcluding": "9.0.12",
"matchCriteriaId": "9DABB61F-8BFA-4476-9A59-E0DC68873022"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.1.0",
"versionEndExcluding": "9.1.5",
"matchCriteriaId": "872E6056-5BE6-4FE8-BE33-F98CF0DBC67C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:paloaltonetworks:pa-200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C4A00CA4-326B-45A1-A4C1-46DDA28819AA"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:paloaltonetworks:pa-2020:-:*:*:*:*:*:*:*",
"matchCriteriaId": "17D4C591-22F5-44A8-8490-7B4AD0682414"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:paloaltonetworks:pa-2050:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ADF87CC5-485D-4F39-953C-A727CF0A5305"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:paloaltonetworks:pa-220:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E75FBB9F-24D9-413A-ABC8-6ACFD99F4097"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:paloaltonetworks:pa-3020:-:*:*:*:*:*:*:*",
"matchCriteriaId": "43FCBC3C-C1EC-43D3-80CE-6C8D0C465FD3"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:paloaltonetworks:pa-3050:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2480738F-8A68-4B15-8893-0BD9AA4660B8"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:paloaltonetworks:pa-3060:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F3DA3033-6239-47D4-9CF9-11AE51E0308E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:paloaltonetworks:pa-3220:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A1D39EA7-7F92-4CF0-AF52-D6DA4A35683A"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:paloaltonetworks:pa-3250:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2632686-9B16-4CDB-8874-55CDB86CA90F"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:paloaltonetworks:pa-3260:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DED6DB33-02C3-421E-B289-0E735293F100"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:paloaltonetworks:pa-500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6550421C-0EA0-4C04-93C9-F862B1CDED67"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:paloaltonetworks:pa-5200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0196D5B4-9C82-4DC6-9A3D-3397BE92D153"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:paloaltonetworks:pa-800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5BC340BF-F1B1-4EE8-91C9-DF650B26555F"
}
]
}
]
}
],
"references": [
{
"url": "https://security.paloaltonetworks.com/CVE-2021-3031",
"source": "psirt@paloaltonetworks.com",
"tags": [
"Vendor Advisory"
]
}
]
}