Логотип exploitDog
bind:CVE-2025-2182
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-2182

Количество 3

Количество 3

nvd логотип

CVE-2025-2182

6 месяцев назад

A problem with the implementation of the MACsec protocol in Palo Alto Networks PAN-OS® results in the cleartext exposure of the connectivity association key (CAK). This issue is only applicable to PA-7500 Series devices which are in an NGFW cluster. A user who possesses this key can read messages being sent between devices in a NGFW Cluster. There is no impact in non-clustered firewalls or clusters of firewalls that do not enable MACsec.

EPSS: Низкий
github логотип

GHSA-75rp-wjf6-546r

6 месяцев назад

A problem with the implementation of the MACsec protocol in Palo Alto Networks PAN-OS® results in the cleartext exposure of the connectivity association key (CAK). This issue is only applicable to PA-7500 Series devices which are in an NGFW cluster. A user who possesses this key can read messages being sent between devices in a NGFW Cluster. There is no impact in non-clustered firewalls or clusters of firewalls that do not enable MACsec.

EPSS: Низкий
fstec логотип

BDU:2025-12675

11 месяцев назад

Уязвимость протокола MACsec операционной системы PAN-OS, позволяющая нарушителю получить доступ на чтение данных

CVSS3: 4.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-2182

A problem with the implementation of the MACsec protocol in Palo Alto Networks PAN-OS® results in the cleartext exposure of the connectivity association key (CAK). This issue is only applicable to PA-7500 Series devices which are in an NGFW cluster. A user who possesses this key can read messages being sent between devices in a NGFW Cluster. There is no impact in non-clustered firewalls or clusters of firewalls that do not enable MACsec.

0%
Низкий
6 месяцев назад
github логотип
GHSA-75rp-wjf6-546r

A problem with the implementation of the MACsec protocol in Palo Alto Networks PAN-OS® results in the cleartext exposure of the connectivity association key (CAK). This issue is only applicable to PA-7500 Series devices which are in an NGFW cluster. A user who possesses this key can read messages being sent between devices in a NGFW Cluster. There is no impact in non-clustered firewalls or clusters of firewalls that do not enable MACsec.

0%
Низкий
6 месяцев назад
fstec логотип
BDU:2025-12675

Уязвимость протокола MACsec операционной системы PAN-OS, позволяющая нарушителю получить доступ на чтение данных

CVSS3: 4.5
0%
Низкий
11 месяцев назад

Уязвимостей на страницу