{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-01T00:31:23.064","vulnerabilities":[{"cve":{"id":"CVE-2019-1575","sourceIdentifier":"psirt@paloaltonetworks.com","published":"2019-07-16T14:15:12.060","lastModified":"2024-11-21T04:36:50.560","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Information disclosure in PAN-OS 7.1.23 and earlier, PAN-OS 8.0.18 and earlier, PAN-OS 8.1.8-h4 and earlier, and PAN-OS 9.0.2 and earlier may allow for an authenticated user with read-only privileges to extract the API key of the device and/or the username/password from the XML API (in PAN-OS) and possibly escalate privileges granted to them."},{"lang":"es","value":"Una divulgación de información en PAN-OS versiones 7.1.23 y anteriores, PAN-OS versiones 8.0.18 y anteriores, PAN-OS versiones 8.1.8-h4 y anteriores, y PAN-OS versiones 9.0.2 y anteriores, pueden permitir que un usuario autenticado con privilegio de solo lectura para extraer la clave de la API del dispositivo y/o el nombre de usuario y contraseña de la API XML (en PAN-OS) y, posiblemente, escalar los privilegios que se les otorgan."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P","baseScore":6.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-200"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*","versionEndExcluding":"7.1.24","matchCriteriaId":"06091BF0-7420-403E-9F11-E5F5D8E920D5"},{"vulnerable":true,"criteria":"cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"8.0.0","versionEndExcluding":"8.0.19","matchCriteriaId":"27E3A465-115B-4F92-BF8D-315E7C3AB112"},{"vulnerable":true,"criteria":"cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"8.1.0","versionEndExcluding":"8.1.8","matchCriteriaId":"0F57DBD8-DCA7-43FB-AC9E-6BDBB3EBE500"},{"vulnerable":true,"criteria":"cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*","versionStartIncluding":"9.0.0","versionEndIncluding":"9.0.2","matchCriteriaId":"1D5515CF-9BB6-4556-900E-6413279606A1"},{"vulnerable":true,"criteria":"cpe:2.3:o:paloaltonetworks:pan-os:8.1.8:-:*:*:*:*:*:*","matchCriteriaId":"DE191B02-E182-4FBE-8962-4B83404F881A"},{"vulnerable":true,"criteria":"cpe:2.3:o:paloaltonetworks:pan-os:8.1.8:h4:*:*:*:*:*:*","matchCriteriaId":"9BA5E8ED-3B7F-409A-BB1B-0A64C978234E"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/109176","source":"psirt@paloaltonetworks.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://security.paloaltonetworks.com/CVE-2019-1575","source":"psirt@paloaltonetworks.com","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/109176","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://security.paloaltonetworks.com/CVE-2019-1575","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}