Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-75rp-wjf6-546r

Опубликовано: 13 авг. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 5.6

Описание

A problem with the implementation of the MACsec protocol in Palo Alto Networks PAN-OS® results in the cleartext exposure of the connectivity association key (CAK). This issue is only applicable to PA-7500 Series devices which are in an NGFW cluster. A user who possesses this key can read messages being sent between devices in a NGFW Cluster. There is no impact in non-clustered firewalls or clusters of firewalls that do not enable MACsec.

A problem with the implementation of the MACsec protocol in Palo Alto Networks PAN-OS® results in the cleartext exposure of the connectivity association key (CAK). This issue is only applicable to PA-7500 Series devices which are in an NGFW cluster. A user who possesses this key can read messages being sent between devices in a NGFW Cluster. There is no impact in non-clustered firewalls or clusters of firewalls that do not enable MACsec.

EPSS

Процентиль: 2%
0.00013
Низкий

5.6 Medium

CVSS4

Дефекты

CWE-312

Связанные уязвимости

nvd
6 месяцев назад

A problem with the implementation of the MACsec protocol in Palo Alto Networks PAN-OS® results in the cleartext exposure of the connectivity association key (CAK). This issue is only applicable to PA-7500 Series devices which are in an NGFW cluster. A user who possesses this key can read messages being sent between devices in a NGFW Cluster. There is no impact in non-clustered firewalls or clusters of firewalls that do not enable MACsec.

CVSS3: 4.5
fstec
11 месяцев назад

Уязвимость протокола MACsec операционной системы PAN-OS, позволяющая нарушителю получить доступ на чтение данных

EPSS

Процентиль: 2%
0.00013
Низкий

5.6 Medium

CVSS4

Дефекты

CWE-312