Palo Alto Networks Security Advisories /CVE-2024-3387CVE-2024-3387 PAN-OS: Weak Certificate Strength in Panorama Software Leads to Sensitive Information DisclosureUrgencyMODERATEResponse EffortMODERATERecoveryAUTOMATICValue DensityCONCENTRATEDAttack VectorNETWORKAttack ComplexityHIGHAttack RequirementsPRESENTAutomatableNOUser InteractionPASSIVEProduct ConfidentialityHIGHProduct IntegrityNONEProduct AvailabilityNONEPrivileges RequiredNONESubsequent ConfidentialityNONESubsequent IntegrityNONESubsequent AvailabilityNONENVDJSON Published2024-04-10 Updated2024-04-10ReferencePAN-200047Discoveredin production useDescriptionA weak (low bit strength) device certificate in Palo Alto Networks Panorama software enables an attacker to perform a meddler-in-the-middle (MitM) attack to capture encrypted traffic between the Panorama management server and the firewalls it manages. With sufficient computing resources, the attacker could break encrypted communication and expose sensitive information that is shared between the management server and the firewalls.Product StatusVersionsAffectedUnaffectedCloud NGFW NoneAllPAN-OS 11.1NoneAllPAN-OS 11.0< 11.0.4 on Panorama>= 11.0.4 on PanoramaPAN-OS 10.2< 10.2.7-h3 on Panorama, < 10.2.8 on Panorama>= 10.2.7-h3 on Panorama, >= 10.2.8 on PanoramaPAN-OS 10.1< 10.1.12 on Panorama>= 10.1.12 on PanoramaPAN-OS 9.1NoneAllPAN-OS 9.0NoneAllPrisma Access NoneAllSeverity:MEDIUMCVSSv4.0Base Score:6 (CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/AU:N/R:A/V:C/RE:M/U:Amber)Exploitation StatusPalo Alto Networks is not aware of any malicious exploitation of this issue.Weakness TypeCWE-326 Inadequate Encryption StrengthSolutionThis issue is fixed on Panorama in PAN-OS 10.1.12, PAN-OS 10.2.7-h3, PAN-OS 10.2.8, PAN-OS 11.0.4, and all later PAN-OS versions.AcknowledgmentsPalo Alto Networks thanks one of our customers for discovering and reporting this issue.Timeline2024-04-10Initial publication