### [CVE-2021-3047](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3047) ![](https://img.shields.io/static/v1?label=Product&message=PAN-OS&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=10.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=8.1%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=9.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=9.1%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-338%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20(PRNG)&color=brightgreen) ### Description A cryptographically weak pseudo-random number generator (PRNG) is used during authentication to the Palo Alto Networks PAN-OS web interface. This enables an authenticated attacker, with the capability to observe their own authentication secrets over a long duration on the PAN-OS appliance, to impersonate another authenticated web interface administrator's session. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.19; PAN-OS 9.0 versions earlier than PAN-OS 9.0.14; PAN-OS 9.1 versions earlier than PAN-OS 9.1.10; PAN-OS 10.0 versions earlier than PAN-OS 10.0.4. PAN-OS 10.1 versions are not impacted. ### POC #### Reference No PoCs from references. #### Github - https://github.com/n0-traces/cve_monitor