CVE-2021-3031
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
13/01/2021
Last modified:
27/10/2022
Description
Padding bytes in Ethernet packets on PA-200, PA-220, PA-500, PA-800, PA-2000 Series, PA-3000 Series, PA-3200 Series, PA-5200 Series, and PA-7000 Series firewalls are not cleared before the data frame is created. This leaks a small amount of random information from the firewall memory into the Ethernet packets. An attacker on the same Ethernet subnet as the PAN-OS firewall is able to collect potentially sensitive information from these packets. This issue is also known as Etherleak and is detected by security scanners as CVE-2003-0001. This issue impacts: PAN-OS 8.1 version earlier than PAN-OS 8.1.18; PAN-OS 9.0 versions earlier than PAN-OS 9.0.12; PAN-OS 9.1 versions earlier than PAN-OS 9.1.5.
Impact
Base Score 3.x
4.30
Severity 3.x
MEDIUM
Base Score 2.0
3.30
Severity 2.0
LOW
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:* | 8.1.0 (including) | 8.1.18 (excluding) |
| cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:* | 9.0.0 (including) | 9.0.12 (excluding) |
| cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:* | 9.1.0 (including) | 9.1.5 (excluding) |
| cpe:2.3:h:paloaltonetworks:pa-200:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:paloaltonetworks:pa-2020:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:paloaltonetworks:pa-2050:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:paloaltonetworks:pa-220:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:paloaltonetworks:pa-3020:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:paloaltonetworks:pa-3050:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:paloaltonetworks:pa-3060:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:paloaltonetworks:pa-3220:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:paloaltonetworks:pa-3250:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:paloaltonetworks:pa-3260:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:paloaltonetworks:pa-500:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:paloaltonetworks:pa-5200:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



