3 vulnerabilities classified as CWE-534. AI Chinese analysis included.
CWE-534 represents a deprecated information exposure weakness where sensitive data is inadvertently revealed through debug log files. Although superseded by the more granular CWE-532, this vulnerability historically occurred when applications retained verbose diagnostic output in accessible locations. Attackers typically exploit this by directly accessing or downloading these log files, extracting credentials, session tokens, or internal system architecture details that were never intended for public view. This exposure often stems from developers leaving debug modes enabled in production environments or failing to sanitize log outputs. To prevent such leaks, engineers must ensure that logging mechanisms are strictly disabled or configured to minimal severity levels in live deployments. Additionally, implementing robust access controls on log directories and regularly auditing file permissions ensures that diagnostic data remains isolated from unauthorized users, thereby mitigating the risk of accidental information disclosure.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2023-5028 | China Unicom TEWA-800G debug log file — TEWA-800G | 2.0 | Low | 2023-09-17 |
| CVE-2021-3037 | PAN-OS: Secrets for scheduled configuration exports are logged in system logs — PAN-OS | 2.3 | Low | 2021-04-20 |
| CVE-2020-2004 | GlobalProtect App: Passwords may be logged in clear text while collecting troubleshooting logs — GlobalProtect App | 6.8 | Medium | 2020-05-13 |
Vulnerabilities classified as CWE-534 represent 3 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.