{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-13T21:06:22.969","vulnerabilities":[{"cve":{"id":"CVE-2021-3043","sourceIdentifier":"psirt@paloaltonetworks.com","published":"2021-07-15T17:15:08.793","lastModified":"2024-11-21T06:20:49.830","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A reflected cross-site scripting (XSS) vulnerability exists in the Prisma Cloud Compute web console that enables a remote attacker to execute arbitrary JavaScript code in the browser-based web console while an authenticated administrator is using that web interface. Prisma Cloud Compute SaaS versions were automatically upgraded to the fixed release. No additional action is required for these instances. This issue impacts: Prisma Cloud Compute 20.12 versions earlier than Prisma Cloud Compute 20.12.552; Prisma Cloud Compute 21.04 versions earlier than Prisma Cloud Compute 21.04.439."},{"lang":"es","value":"Se presenta una vulnerabilidad de tipo cross-site scripting (XSS) reflejado en Prisma Cloud Compute web console que permite a un atacante remoto ejecutar código JavaScript arbitrario en la consola web basada en el navegador mientras un administrador autenticado está usando esa interfaz web. Unas versiones de Prisma Cloud Compute SaaS se actualizaron automáticamente a la versión corregida. No se requiere ninguna acción adicional para estas instancias. Este problema afecta: Prisma Cloud Compute versión 20.12 versiones anteriores a Prisma Cloud Compute 20.12.552; Prisma Cloud Compute versiones 21.04 anteriores a Prisma Cloud Compute versión 21.04.439"}],"metrics":{"cvssMetricV31":[{"source":"psirt@paloaltonetworks.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.6,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N","baseScore":4.8,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":1.7,"impactScore":2.7}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:S/C:N/I:P/A:N","baseScore":3.5,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":6.8,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"psirt@paloaltonetworks.com","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:paloaltonetworks:prisma_cloud:*:*:*:*:compute:*:*:*","versionStartIncluding":"20.12","versionEndExcluding":"20.12.552","matchCriteriaId":"BCCD3425-119C-42F6-8D76-4BF8DB98B058"},{"vulnerable":true,"criteria":"cpe:2.3:a:paloaltonetworks:prisma_cloud:*:*:*:*:compute:*:*:*","versionStartIncluding":"21.04","versionEndExcluding":"21.04.439","matchCriteriaId":"2E6F3B93-F4CB-4DD4-B8D9-557633A603AB"}]}]}],"references":[{"url":"https://security.paloaltonetworks.com/CVE-2021-3043","source":"psirt@paloaltonetworks.com","tags":["Vendor Advisory"]},{"url":"https://security.paloaltonetworks.com/CVE-2021-3043","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}