/

CVE-2023-6791 Report - Details, Severity, & Advisories

CVE-2023-6791 Report - Details, Severity, & Advisories

Twingate Team

May 13, 2024

CVE-2023-6791 is a medium-severity vulnerability affecting certain versions of Palo Alto Networks PAN-OS software. This credential disclosure vulnerability allows an authenticated read-only administrator to obtain plaintext credentials of stored external system integrations, such as LDAP, SCP, RADIUS, TACACS+, and SNMP, from the web interface. Systems running specific versions of PAN-OS software are at risk, but the issue has been fixed in later releases.

How do I know if I'm affected by?

To determine if you're affected by the CVE-2023-6791 vulnerability, you need to check your PAN-OS software version. You're at risk if you're using PAN-OS 11.0 versions less than 11.0.1, PAN-OS 10.2 versions less than 10.2.4, PAN-OS 10.1 versions less than 10.1.9, PAN-OS 10.0 versions less than 10.0.12, PAN-OS 9.1 versions less than 9.1.16, PAN-OS 9.0 versions less than 9.0.17, or PAN-OS 8.1 versions less than 8.1.24-h1. This vulnerability allows an authenticated read-only administrator to access plaintext credentials of stored external system integrations, such as LDAP, SCP, RADIUS, TACACS+, and SNMP, from the web interface.

What should I do if I'm affected?

If you're affected by the CVE-2023-6791 vulnerability, follow these simple steps: first, upgrade your PAN-OS software to a fixed version. Next, issue new credentials for the impacted external integrations. Finally, follow the best practices for securing administrative access to mitigate the issue.

Is CVE-2023-6791 in CISA’s Known Exploited Vulnerabilities Catalog?

The CVE-2023-6791 vulnerability is not listed in CISA's Known Exploited Vulnerabilities Catalog. This security issue allows someone with limited access to view important passwords in an easily readable format. To address this vulnerability, users should update their software to a fixed version and change their passwords for certain services.

Weakness enumeration

The weakness enumeration for this vulnerability is categorized as CWE-522 and CWE-701, involves weaknesses in protecting credentials and design flaws, allowing unauthorized access to sensitive information in PAN-OS software.

For more details

CVE-2023-6791 is a medium-severity vulnerability in Palo Alto Networks PAN-OS software, allowing unauthorized access to sensitive information. For a comprehensive understanding of this vulnerability, including its description, severity, technical details, and known affected software configurations, visit the NVD or refer to the links below.

Rapidly implement a modern Zero Trust network that is more secure and maintainable than VPNs.

/

CVE-2023-6791 Report - Details, Severity, & Advisories

CVE-2023-6791 Report - Details, Severity, & Advisories

Twingate Team

May 13, 2024

CVE-2023-6791 is a medium-severity vulnerability affecting certain versions of Palo Alto Networks PAN-OS software. This credential disclosure vulnerability allows an authenticated read-only administrator to obtain plaintext credentials of stored external system integrations, such as LDAP, SCP, RADIUS, TACACS+, and SNMP, from the web interface. Systems running specific versions of PAN-OS software are at risk, but the issue has been fixed in later releases.

How do I know if I'm affected by?

To determine if you're affected by the CVE-2023-6791 vulnerability, you need to check your PAN-OS software version. You're at risk if you're using PAN-OS 11.0 versions less than 11.0.1, PAN-OS 10.2 versions less than 10.2.4, PAN-OS 10.1 versions less than 10.1.9, PAN-OS 10.0 versions less than 10.0.12, PAN-OS 9.1 versions less than 9.1.16, PAN-OS 9.0 versions less than 9.0.17, or PAN-OS 8.1 versions less than 8.1.24-h1. This vulnerability allows an authenticated read-only administrator to access plaintext credentials of stored external system integrations, such as LDAP, SCP, RADIUS, TACACS+, and SNMP, from the web interface.

What should I do if I'm affected?

If you're affected by the CVE-2023-6791 vulnerability, follow these simple steps: first, upgrade your PAN-OS software to a fixed version. Next, issue new credentials for the impacted external integrations. Finally, follow the best practices for securing administrative access to mitigate the issue.

Is CVE-2023-6791 in CISA’s Known Exploited Vulnerabilities Catalog?

The CVE-2023-6791 vulnerability is not listed in CISA's Known Exploited Vulnerabilities Catalog. This security issue allows someone with limited access to view important passwords in an easily readable format. To address this vulnerability, users should update their software to a fixed version and change their passwords for certain services.

Weakness enumeration

The weakness enumeration for this vulnerability is categorized as CWE-522 and CWE-701, involves weaknesses in protecting credentials and design flaws, allowing unauthorized access to sensitive information in PAN-OS software.

For more details

CVE-2023-6791 is a medium-severity vulnerability in Palo Alto Networks PAN-OS software, allowing unauthorized access to sensitive information. For a comprehensive understanding of this vulnerability, including its description, severity, technical details, and known affected software configurations, visit the NVD or refer to the links below.

Rapidly implement a modern Zero Trust network that is more secure and maintainable than VPNs.

CVE-2023-6791 Report - Details, Severity, & Advisories

Twingate Team

May 13, 2024

CVE-2023-6791 is a medium-severity vulnerability affecting certain versions of Palo Alto Networks PAN-OS software. This credential disclosure vulnerability allows an authenticated read-only administrator to obtain plaintext credentials of stored external system integrations, such as LDAP, SCP, RADIUS, TACACS+, and SNMP, from the web interface. Systems running specific versions of PAN-OS software are at risk, but the issue has been fixed in later releases.

How do I know if I'm affected by?

To determine if you're affected by the CVE-2023-6791 vulnerability, you need to check your PAN-OS software version. You're at risk if you're using PAN-OS 11.0 versions less than 11.0.1, PAN-OS 10.2 versions less than 10.2.4, PAN-OS 10.1 versions less than 10.1.9, PAN-OS 10.0 versions less than 10.0.12, PAN-OS 9.1 versions less than 9.1.16, PAN-OS 9.0 versions less than 9.0.17, or PAN-OS 8.1 versions less than 8.1.24-h1. This vulnerability allows an authenticated read-only administrator to access plaintext credentials of stored external system integrations, such as LDAP, SCP, RADIUS, TACACS+, and SNMP, from the web interface.

What should I do if I'm affected?

If you're affected by the CVE-2023-6791 vulnerability, follow these simple steps: first, upgrade your PAN-OS software to a fixed version. Next, issue new credentials for the impacted external integrations. Finally, follow the best practices for securing administrative access to mitigate the issue.

Is CVE-2023-6791 in CISA’s Known Exploited Vulnerabilities Catalog?

The CVE-2023-6791 vulnerability is not listed in CISA's Known Exploited Vulnerabilities Catalog. This security issue allows someone with limited access to view important passwords in an easily readable format. To address this vulnerability, users should update their software to a fixed version and change their passwords for certain services.

Weakness enumeration

The weakness enumeration for this vulnerability is categorized as CWE-522 and CWE-701, involves weaknesses in protecting credentials and design flaws, allowing unauthorized access to sensitive information in PAN-OS software.

For more details

CVE-2023-6791 is a medium-severity vulnerability in Palo Alto Networks PAN-OS software, allowing unauthorized access to sensitive information. For a comprehensive understanding of this vulnerability, including its description, severity, technical details, and known affected software configurations, visit the NVD or refer to the links below.