All the vulnerabilites related to paloaltonetworks - globalprotect
cve-2019-17435
Vulnerability from cvelistv5
Published
2019-10-16 18:06
Modified
2024-08-05 01:40
Severity ?
EPSS score ?
Summary
A Local Privilege Escalation vulnerability exists in the GlobalProtect Agent for Windows 5.0.3 and earlier, and GlobalProtect Agent for Windows 4.1.12 and earlier, in which the auto-update feature can allow for modification of a GlobalProtect Agent MSI installer package on disk before installation.
References
▼ | URL | Tags |
---|---|---|
https://security.paloaltonetworks.com/CVE-2019-17435 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Palo Alto Networks | GlobalProtect Agent for Windows |
Version: 5.0.3 and earlier Version: 4.1.12 and earlier |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:40:15.808Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.paloaltonetworks.com/CVE-2019-17435" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "GlobalProtect Agent for Windows", "vendor": "Palo Alto Networks", "versions": [ { "status": "affected", "version": "5.0.3 and earlier" }, { "status": "affected", "version": "4.1.12 and earlier" } ] } ], "descriptions": [ { "lang": "en", "value": "A Local Privilege Escalation vulnerability exists in the GlobalProtect Agent for Windows 5.0.3 and earlier, and GlobalProtect Agent for Windows 4.1.12 and earlier, in which the auto-update feature can allow for modification of a GlobalProtect Agent MSI installer package on disk before installation." } ], "problemTypes": [ { "descriptions": [ { "description": "Escalation of Privilege", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-02-17T16:03:48", "orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "shortName": "palo_alto" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.paloaltonetworks.com/CVE-2019-17435" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@paloaltonetworks.com", "ID": "CVE-2019-17435", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "GlobalProtect Agent for Windows", "version": { "version_data": [ { "version_value": "5.0.3 and earlier" }, { "version_value": "4.1.12 and earlier" } ] } } ] }, "vendor_name": "Palo Alto Networks" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A Local Privilege Escalation vulnerability exists in the GlobalProtect Agent for Windows 5.0.3 and earlier, and GlobalProtect Agent for Windows 4.1.12 and earlier, in which the auto-update feature can allow for modification of a GlobalProtect Agent MSI installer package on disk before installation." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Escalation of Privilege" } ] } ] }, "references": { "reference_data": [ { "name": "https://security.paloaltonetworks.com/CVE-2019-17435", "refsource": "CONFIRM", "url": "https://security.paloaltonetworks.com/CVE-2019-17435" } ] } } } }, "cveMetadata": { "assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "assignerShortName": "palo_alto", "cveId": "CVE-2019-17435", "datePublished": "2019-10-16T18:06:47", "dateReserved": "2019-10-10T00:00:00", "dateUpdated": "2024-08-05T01:40:15.808Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-1573
Vulnerability from cvelistv5
Published
2019-04-09 21:04
Modified
2024-09-16 19:21
Severity ?
EPSS score ?
Summary
GlobalProtect Agent 4.1.0 for Windows and GlobalProtect Agent 4.1.10 and earlier for macOS may allow a local authenticated attacker who has compromised the end-user account and gained the ability to inspect memory, to access authentication and/or session tokens and replay them to spoof the VPN session and gain access as the user.
References
▼ | URL | Tags |
---|---|---|
https://www.kb.cert.org/vuls/id/192371 | third-party-advisory, x_refsource_CERT-VN | |
http://www.securityfocus.com/bid/107868 | vdb-entry, x_refsource_BID | |
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0005 | x_refsource_CONFIRM | |
https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2019-783 | x_refsource_CONFIRM | |
https://security.paloaltonetworks.com/CVE-2019-1573 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | Palo Alto Networks | GlobalProtect Agent |
Version: 4.1 < |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T18:20:28.252Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "VU#192371", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "https://www.kb.cert.org/vuls/id/192371" }, { "name": "107868", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/107868" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0005" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2019-783" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.paloaltonetworks.com/CVE-2019-1573" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Windows" ], "product": "GlobalProtect Agent", "vendor": "Palo Alto Networks", "versions": [ { "changes": [ { "at": "4.1.1", "status": "unaffected" } ], "lessThanOrEqual": "4.1.0", "status": "affected", "version": "4.1", "versionType": "custom" } ] }, { "platforms": [ "OS X" ], "product": "GlobalProtect Agent", "vendor": "Palo Alto Networks", "versions": [ { "lessThan": "4.1*", "status": "unaffected", "version": "4.1.11", "versionType": "custom" } ] } ], "datePublic": "2019-04-09T00:00:00", "descriptions": [ { "lang": "en", "value": "GlobalProtect Agent 4.1.0 for Windows and GlobalProtect Agent 4.1.10 and earlier for macOS may allow a local authenticated attacker who has compromised the end-user account and gained the ability to inspect memory, to access authentication and/or session tokens and replay them to spoof the VPN session and gain access as the user." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-226", "description": "CWE-226 Sensitive Information Uncleared Before Release", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-04-09T13:29:41", "orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "shortName": "palo_alto" }, "references": [ { "name": "VU#192371", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "https://www.kb.cert.org/vuls/id/192371" }, { "name": "107868", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/107868" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0005" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2019-783" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.paloaltonetworks.com/CVE-2019-1573" } ], "solutions": [ { "lang": "en", "value": "This issue is fixed in GlobalProtect Agent 4.1.1 and later for Windows, and GlobalProtect Agent 4.1.11 and later for macOS." } ], "source": { "discovery": "EXTERNAL" }, "title": "Information Disclosure in GlobalProtect Agent", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@paloaltonetworks.com", "DATE_PUBLIC": "2019-04-09T17:45:00.000Z", "ID": "CVE-2019-1573", "STATE": "PUBLIC", "TITLE": "Information Disclosure in GlobalProtect Agent" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "GlobalProtect Agent", "version": { "version_data": [ { "platform": "Windows", "version_affected": "\u003c=", "version_name": "4.1", "version_value": "4.1.0" }, { "platform": "Windows", "version_affected": "!\u003e=", "version_name": "4.1", "version_value": "4.1.1" }, { "platform": "OS X", "version_affected": "!\u003e=", "version_name": "4.1", "version_value": "4.1.11" }, { "platform": "OS X", "version_affected": "\u003c=", "version_name": "4.1", "version_value": "4.1.10 +1" } ] } } ] }, "vendor_name": "Palo Alto Networks" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "GlobalProtect Agent 4.1.0 for Windows and GlobalProtect Agent 4.1.10 and earlier for macOS may allow a local authenticated attacker who has compromised the end-user account and gained the ability to inspect memory, to access authentication and/or session tokens and replay them to spoof the VPN session and gain access as the user." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-226 Sensitive Information Uncleared Before Release" } ] } ] }, "references": { "reference_data": [ { "name": "VU#192371", "refsource": "CERT-VN", "url": "https://www.kb.cert.org/vuls/id/192371" }, { "name": "107868", "refsource": "BID", "url": "http://www.securityfocus.com/bid/107868" }, { "name": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0005", "refsource": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0005" }, { "name": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2019-783", "refsource": "CONFIRM", "url": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2019-783" }, { "name": "https://security.paloaltonetworks.com/CVE-2019-1573", "refsource": "CONFIRM", "url": "https://security.paloaltonetworks.com/CVE-2019-1573" } ] }, "solution": [ { "lang": "en", "value": "This issue is fixed in GlobalProtect Agent 4.1.1 and later for Windows, and GlobalProtect Agent 4.1.11 and later for macOS." } ], "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "assignerShortName": "palo_alto", "cveId": "CVE-2019-1573", "datePublished": "2019-04-09T21:04:01.397792Z", "dateReserved": "2018-12-06T00:00:00", "dateUpdated": "2024-09-16T19:21:01.439Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-2033
Vulnerability from cvelistv5
Published
2020-06-10 17:29
Modified
2024-09-17 03:22
Severity ?
EPSS score ?
Summary
When the pre-logon feature is enabled, a missing certification validation in Palo Alto Networks GlobalProtect app can disclose the pre-logon authentication cookie to a man-in-the-middle attacker on the same local area network segment with the ability to manipulate ARP or to conduct ARP spoofing attacks. This allows the attacker to access the GlobalProtect Server as allowed by configured Security rules for the 'pre-login' user. This access may be limited compared to the network access of regular users. This issue affects: GlobalProtect app 5.0 versions earlier than GlobalProtect app 5.0.10 when the prelogon feature is enabled; GlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.4 when the prelogon feature is enabled.
References
▼ | URL | Tags |
---|---|---|
https://security.paloaltonetworks.com/CVE-2020-2033 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Palo Alto Networks | GlobalProtect App |
Version: 5.1 < 5.1.4 Version: 5.0 < 5.0.10 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:54:00.591Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security.paloaltonetworks.com/CVE-2020-2033" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "GlobalProtect App", "vendor": "Palo Alto Networks", "versions": [ { "changes": [ { "at": "5.1.4", "status": "unaffected" } ], "lessThan": "5.1.4", "status": "affected", "version": "5.1", "versionType": "custom" }, { "changes": [ { "at": "5.0.10", "status": "unaffected" } ], "lessThan": "5.0.10", "status": "affected", "version": "5.0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Palo Alto Networks thanks Tom Wyckhuys and Nabeel Ahmed from NTT Belgium for discovering and reporting this issue." } ], "datePublic": "2020-06-10T00:00:00", "descriptions": [ { "lang": "en", "value": "When the pre-logon feature is enabled, a missing certification validation in Palo Alto Networks GlobalProtect app can disclose the pre-logon authentication cookie to a man-in-the-middle attacker on the same local area network segment with the ability to manipulate ARP or to conduct ARP spoofing attacks. This allows the attacker to access the GlobalProtect Server as allowed by configured Security rules for the \u0027pre-login\u0027 user. This access may be limited compared to the network access of regular users. This issue affects: GlobalProtect app 5.0 versions earlier than GlobalProtect app 5.0.10 when the prelogon feature is enabled; GlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.4 when the prelogon feature is enabled." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-290", "description": "CWE-290 Authentication Bypass by Spoofing", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-295", "description": "CWE-295 Improper Certificate Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-06-10T17:29:41", "orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "shortName": "palo_alto" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security.paloaltonetworks.com/CVE-2020-2033" } ], "solutions": [ { "lang": "en", "value": "This issue is fixed in GlobalProtect app 5.0.10, GlobalProtect app 5.1.4, and all later GlobalProtect app versions." } ], "source": { "defect": [ "GPC-10741" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2020-06-10T00:00:00", "value": "Initial publication" } ], "title": "GlobalProtect App: Missing certificate validation vulnerability can disclose pre-logon authentication cookie", "workarounds": [ { "lang": "en", "value": "The impact of this vulnerability can be mitigated by decreasing the allowed timeout settings for the prelogon feature or disabling the feature in the GlobalProtect gateway." } ], "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@paloaltonetworks.com", "DATE_PUBLIC": "2020-06-10T16:00:00.000Z", "ID": "CVE-2020-2033", "STATE": "PUBLIC", "TITLE": "GlobalProtect App: Missing certificate validation vulnerability can disclose pre-logon authentication cookie" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "GlobalProtect App", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "5.1", "version_value": "5.1.4" }, { "version_affected": "\u003c", "version_name": "5.0", "version_value": "5.0.10" }, { "version_affected": "!\u003e=", "version_name": "5.1", "version_value": "5.1.4" }, { "version_affected": "!\u003e=", "version_name": "5.0", "version_value": "5.0.10" } ] } } ] }, "vendor_name": "Palo Alto Networks" } ] } }, "credit": [ { "lang": "eng", "value": "Palo Alto Networks thanks Tom Wyckhuys and Nabeel Ahmed from NTT Belgium for discovering and reporting this issue." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "When the pre-logon feature is enabled, a missing certification validation in Palo Alto Networks GlobalProtect app can disclose the pre-logon authentication cookie to a man-in-the-middle attacker on the same local area network segment with the ability to manipulate ARP or to conduct ARP spoofing attacks. This allows the attacker to access the GlobalProtect Server as allowed by configured Security rules for the \u0027pre-login\u0027 user. This access may be limited compared to the network access of regular users. This issue affects: GlobalProtect app 5.0 versions earlier than GlobalProtect app 5.0.10 when the prelogon feature is enabled; GlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.4 when the prelogon feature is enabled." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-290 Authentication Bypass by Spoofing" } ] }, { "description": [ { "lang": "eng", "value": "CWE-295 Improper Certificate Validation" } ] } ] }, "references": { "reference_data": [ { "name": "https://security.paloaltonetworks.com/CVE-2020-2033", "refsource": "MISC", "url": "https://security.paloaltonetworks.com/CVE-2020-2033" } ] }, "solution": [ { "lang": "en", "value": "This issue is fixed in GlobalProtect app 5.0.10, GlobalProtect app 5.1.4, and all later GlobalProtect app versions." } ], "source": { "defect": [ "GPC-10741" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2020-06-10T00:00:00", "value": "Initial publication" } ], "work_around": [ { "lang": "en", "value": "The impact of this vulnerability can be mitigated by decreasing the allowed timeout settings for the prelogon feature or disabling the feature in the GlobalProtect gateway." } ] } } }, "cveMetadata": { "assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "assignerShortName": "palo_alto", "cveId": "CVE-2020-2033", "datePublished": "2020-06-10T17:29:41.793194Z", "dateReserved": "2019-12-04T00:00:00", "dateUpdated": "2024-09-17T03:22:58.911Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-17436
Vulnerability from cvelistv5
Published
2019-10-16 18:06
Modified
2024-08-05 01:40
Severity ?
EPSS score ?
Summary
A Local Privilege Escalation vulnerability exists in GlobalProtect Agent for Linux and Mac OS X version 5.0.4 and earlier and version 4.1.12 and earlier, that can allow non-root users to overwrite root files on the file system.
References
▼ | URL | Tags |
---|---|---|
https://security.paloaltonetworks.com/CVE-2019-17436 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Palo Alto Networks | GlobalProtect Agent for Linux and OSX |
Version: 5.0.4 and earlier Version: 4.1.12 and earlier |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:40:15.863Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.paloaltonetworks.com/CVE-2019-17436" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "GlobalProtect Agent for Linux and OSX", "vendor": "Palo Alto Networks", "versions": [ { "status": "affected", "version": "5.0.4 and earlier" }, { "status": "affected", "version": "4.1.12 and earlier" } ] } ], "descriptions": [ { "lang": "en", "value": "A Local Privilege Escalation vulnerability exists in GlobalProtect Agent for Linux and Mac OS X version 5.0.4 and earlier and version 4.1.12 and earlier, that can allow non-root users to overwrite root files on the file system." } ], "problemTypes": [ { "descriptions": [ { "description": "Escalation of Privilege", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-02-17T16:03:48", "orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "shortName": "palo_alto" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.paloaltonetworks.com/CVE-2019-17436" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@paloaltonetworks.com", "ID": "CVE-2019-17436", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "GlobalProtect Agent for Linux and OSX", "version": { "version_data": [ { "version_value": "5.0.4 and earlier" }, { "version_value": "4.1.12 and earlier" } ] } } ] }, "vendor_name": "Palo Alto Networks" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A Local Privilege Escalation vulnerability exists in GlobalProtect Agent for Linux and Mac OS X version 5.0.4 and earlier and version 4.1.12 and earlier, that can allow non-root users to overwrite root files on the file system." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Escalation of Privilege" } ] } ] }, "references": { "reference_data": [ { "name": "https://security.paloaltonetworks.com/CVE-2019-17436", "refsource": "CONFIRM", "url": "https://security.paloaltonetworks.com/CVE-2019-17436" } ] } } } }, "cveMetadata": { "assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "assignerShortName": "palo_alto", "cveId": "CVE-2019-17436", "datePublished": "2019-10-16T18:06:44", "dateReserved": "2019-10-10T00:00:00", "dateUpdated": "2024-08-05T01:40:15.863Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-0009
Vulnerability from cvelistv5
Published
2023-06-14 16:31
Modified
2024-12-30 15:24
Severity ?
EPSS score ?
Summary
A local privilege escalation (PE) vulnerability in the Palo Alto Networks GlobalProtect app on Windows enables a local user to execute programs with elevated privileges.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Palo Alto Networks | GlobalProtect App |
Version: 6.1 < 6.1.1 Version: 6.0 < 6.0.5 Version: 5.2 < 5.2.13 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.577Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://security.paloaltonetworks.com/CVE-2023-0009" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-0009", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-12-30T15:24:17.492102Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-30T15:24:31.911Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "GlobalProtect App", "vendor": "Palo Alto Networks", "versions": [ { "status": "unaffected", "version": "6.2" }, { "changes": [ { "at": "6.1.1", "status": "unaffected" } ], "lessThan": "6.1.1", "status": "affected", "version": "6.1", "versionType": "custom" }, { "changes": [ { "at": "6.0.5", "status": "unaffected" } ], "lessThan": "6.0.5", "status": "affected", "version": "6.0", "versionType": "custom" }, { "changes": [ { "at": "5.2.13", "status": "unaffected" } ], "lessThan": "5.2.13", "status": "affected", "version": "5.2", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Mohammad Arman from Zurich Insurance" } ], "datePublic": "2023-06-14T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eA local privilege escalation (PE) vulnerability in the Palo Alto Networks GlobalProtect app on Windows enables a local user to execute programs with elevated privileges.\u003c/span\u003e\u003cbr\u003e" } ], "value": "A local privilege escalation (PE) vulnerability in the Palo Alto Networks GlobalProtect app on Windows enables a local user to execute programs with elevated privileges.\n" } ], "exploits": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue.\u003cbr\u003e" } ], "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue.\n" } ], "impacts": [ { "capecId": "CAPEC-233", "descriptions": [ { "lang": "en", "value": "CAPEC-233 Privilege Escalation" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-807", "description": "CWE-807: Reliance on Untrusted Inputs in a Security Decision", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-31T20:36:04.826Z", "orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "shortName": "palo_alto" }, "references": [ { "url": "https://security.paloaltonetworks.com/CVE-2023-0009" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "This issue is fixed in GlobalProtect app 5.2.13, GlobalProtect app 6.0.5, GlobalProtect app 6.1.1, and all later GlobalProtect app versions." } ], "value": "This issue is fixed in GlobalProtect app 5.2.13, GlobalProtect app 6.0.5, GlobalProtect app 6.1.1, and all later GlobalProtect app versions." } ], "source": { "defect": [ "GPC-16078" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2023-06-14T16:00:00.000Z", "value": "Initial publication" }, { "lang": "en", "time": "2023-07-31T20:35:00.000Z", "value": "Validated an attack scenario that does not require the Windows user to have special privileges" } ], "title": "GlobalProtect App: Local Privilege Escalation (PE) Vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "assignerShortName": "palo_alto", "cveId": "CVE-2023-0009", "datePublished": "2023-06-14T16:31:58.622Z", "dateReserved": "2022-10-27T18:48:18.633Z", "dateUpdated": "2024-12-30T15:24:31.911Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-1976
Vulnerability from cvelistv5
Published
2020-02-12 22:57
Modified
2024-09-17 01:51
Severity ?
EPSS score ?
Summary
A denial-of-service (DoS) vulnerability in Palo Alto Networks GlobalProtect software running on Mac OS allows authenticated local users to cause the Mac OS kernel to hang or crash. This issue affects GlobalProtect 5.0.5 and earlier versions of GlobalProtect 5.0 on Mac OS.
References
▼ | URL | Tags |
---|---|---|
https://security.paloaltonetworks.com/CVE-2020-1976 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Palo Alto Networks | GlobalProtect |
Version: 5.0 < |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:54:00.347Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security.paloaltonetworks.com/CVE-2020-1976" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Mac OS" ], "product": "GlobalProtect", "vendor": "Palo Alto Networks", "versions": [ { "changes": [ { "at": "5.0.6", "status": "unaffected" } ], "lessThanOrEqual": "5.0.5", "status": "affected", "version": "5.0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "This issue was discovered during a security test performed in collaboration with IOActive." } ], "datePublic": "2020-02-12T00:00:00", "descriptions": [ { "lang": "en", "value": "A denial-of-service (DoS) vulnerability in Palo Alto Networks GlobalProtect software running on Mac OS allows authenticated local users to cause the Mac OS kernel to hang or crash. This issue affects GlobalProtect 5.0.5 and earlier versions of GlobalProtect 5.0 on Mac OS." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-642", "description": "CWE-642 External Control of Critical State Data", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-02-12T22:57:08", "orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "shortName": "palo_alto" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security.paloaltonetworks.com/CVE-2020-1976" } ], "solutions": [ { "lang": "en", "value": "This issue is fixed in GlobalProtect 5.0.6, GlobalProtect 5.1.0, and all later versions." } ], "source": { "defect": [ "GPC-9616" ], "discovery": "INTERNAL" }, "title": "GlobalProtect on MacOS: Local denial-of-service (DoS) vulnerability.", "workarounds": [ { "lang": "en", "value": "n/a" } ], "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@paloaltonetworks.com", "DATE_PUBLIC": "2020-02-12T17:00:00.000Z", "ID": "CVE-2020-1976", "STATE": "PUBLIC", "TITLE": "GlobalProtect on MacOS: Local denial-of-service (DoS) vulnerability." }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "GlobalProtect", "version": { "version_data": [ { "platform": "Mac OS", "version_affected": "\u003c=", "version_name": "5.0", "version_value": "5.0.5" }, { "platform": "Mac OS", "version_affected": "!\u003e=", "version_name": "5.0", "version_value": "5.0.6" } ] } } ] }, "vendor_name": "Palo Alto Networks" } ] } }, "credit": [ { "lang": "eng", "value": "This issue was discovered during a security test performed in collaboration with IOActive." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A denial-of-service (DoS) vulnerability in Palo Alto Networks GlobalProtect software running on Mac OS allows authenticated local users to cause the Mac OS kernel to hang or crash. This issue affects GlobalProtect 5.0.5 and earlier versions of GlobalProtect 5.0 on Mac OS." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-642 External Control of Critical State Data" } ] } ] }, "references": { "reference_data": [ { "name": "https://security.paloaltonetworks.com/CVE-2020-1976", "refsource": "MISC", "url": "https://security.paloaltonetworks.com/CVE-2020-1976" } ] }, "solution": [ { "lang": "en", "value": "This issue is fixed in GlobalProtect 5.0.6, GlobalProtect 5.1.0, and all later versions." } ], "source": { "defect": [ "GPC-9616" ], "discovery": "INTERNAL" }, "work_around": [ { "lang": "en", "value": "n/a" } ] } } }, "cveMetadata": { "assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "assignerShortName": "palo_alto", "cveId": "CVE-2020-1976", "datePublished": "2020-02-12T22:57:08.144091Z", "dateReserved": "2019-12-04T00:00:00", "dateUpdated": "2024-09-17T01:51:07.142Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-0017
Vulnerability from cvelistv5
Published
2022-02-10 18:10
Modified
2024-09-16 17:58
Severity ?
EPSS score ?
Summary
An improper link resolution before file access ('link following') vulnerability exists in the Palo Alto Networks GlobalProtect app on Windows that enables a local attacker to disrupt system processes and potentially execute arbitrary code with SYSTEM privileges under certain circumstances. This issue impacts: GlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.10 on Windows. GlobalProtect app 5.2 versions earlier than GlobalProtect app 5.2.5 on Windows. This issue does not affect GlobalProtect app on other platforms.
References
▼ | URL | Tags |
---|---|---|
https://security.paloaltonetworks.com/CVE-2022-0017 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | Palo Alto Networks | GlobalProtect App |
Version: 5.2 < 5.2.5 Version: 5.1 < 5.1.10 |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:18:41.344Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security.paloaltonetworks.com/CVE-2022-0017" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Windows" ], "product": "GlobalProtect App", "vendor": "Palo Alto Networks", "versions": [ { "changes": [ { "at": "5.2.5", "status": "unaffected" } ], "lessThan": "5.2.5", "status": "affected", "version": "5.2", "versionType": "custom" }, { "changes": [ { "at": "5.1.10", "status": "unaffected" } ], "lessThan": "5.1.10", "status": "affected", "version": "5.1", "versionType": "custom" } ] }, { "product": "GlobalProtect App", "vendor": "Palo Alto Networks", "versions": [ { "status": "unaffected", "version": "5.3.*" } ] } ], "credits": [ { "lang": "en", "value": "Palo Alto Networks thanks Christophe Schleypen of NATO Cyber Security Centre Pentesting for discovering and reporting this issue." } ], "datePublic": "2022-02-09T00:00:00", "descriptions": [ { "lang": "en", "value": "An improper link resolution before file access (\u0027link following\u0027) vulnerability exists in the Palo Alto Networks GlobalProtect app on Windows that enables a local attacker to disrupt system processes and potentially execute arbitrary code with SYSTEM privileges under certain circumstances. This issue impacts: GlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.10 on Windows. GlobalProtect app 5.2 versions earlier than GlobalProtect app 5.2.5 on Windows. This issue does not affect GlobalProtect app on other platforms." } ], "exploits": [ { "lang": "en", "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-59", "description": "CWE-59 Improper Link Resolution Before File Access (\u0027Link Following\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-10T18:10:18", "orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "shortName": "palo_alto" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security.paloaltonetworks.com/CVE-2022-0017" } ], "solutions": [ { "lang": "en", "value": "This issue is fixed in GlobalProtect app 5.1.10 on Windows, GlobalProtect app 5.2.5 on Windows and all later GlobalProtect app versions." } ], "source": { "defect": [ "GPC-10982" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2022-02-09T00:00:00", "value": "Initial publication" } ], "title": "GlobalProtect App: Improper Link Resolution Vulnerability Leads to Local Privilege Escalation", "workarounds": [ { "lang": "en", "value": "There are no known workarounds for this issue." } ], "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@paloaltonetworks.com", "DATE_PUBLIC": "2022-02-09T17:00:00.000Z", "ID": "CVE-2022-0017", "STATE": "PUBLIC", "TITLE": "GlobalProtect App: Improper Link Resolution Vulnerability Leads to Local Privilege Escalation" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "GlobalProtect App", "version": { "version_data": [ { "platform": "Windows", "version_affected": "\u003c", "version_name": "5.2", "version_value": "5.2.5" }, { "platform": "Windows", "version_affected": "!\u003e=", "version_name": "5.2", "version_value": "5.2.5" }, { "platform": "Windows", "version_affected": "\u003c", "version_name": "5.1", "version_value": "5.1.10" }, { "platform": "Windows", "version_affected": "!\u003e=", "version_name": "5.1", "version_value": "5.1.10" }, { "version_affected": "!", "version_name": "5.3", "version_value": "5.3.*" } ] } } ] }, "vendor_name": "Palo Alto Networks" } ] } }, "credit": [ { "lang": "eng", "value": "Palo Alto Networks thanks Christophe Schleypen of NATO Cyber Security Centre Pentesting for discovering and reporting this issue." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An improper link resolution before file access (\u0027link following\u0027) vulnerability exists in the Palo Alto Networks GlobalProtect app on Windows that enables a local attacker to disrupt system processes and potentially execute arbitrary code with SYSTEM privileges under certain circumstances. This issue impacts: GlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.10 on Windows. GlobalProtect app 5.2 versions earlier than GlobalProtect app 5.2.5 on Windows. This issue does not affect GlobalProtect app on other platforms." } ] }, "exploit": [ { "lang": "en", "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue." } ], "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-59 Improper Link Resolution Before File Access (\u0027Link Following\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://security.paloaltonetworks.com/CVE-2022-0017", "refsource": "MISC", "url": "https://security.paloaltonetworks.com/CVE-2022-0017" } ] }, "solution": [ { "lang": "en", "value": "This issue is fixed in GlobalProtect app 5.1.10 on Windows, GlobalProtect app 5.2.5 on Windows and all later GlobalProtect app versions." } ], "source": { "defect": [ "GPC-10982" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2022-02-09T00:00:00", "value": "Initial publication" } ], "work_around": [ { "lang": "en", "value": "There are no known workarounds for this issue." } ], "x_advisoryEoL": true, "x_affectedList": [ "GlobalProtect App 5.2.4", "GlobalProtect App 5.2.3", "GlobalProtect App 5.2.2", "GlobalProtect App 5.2.1", "GlobalProtect App 5.2.0", "GlobalProtect App 5.2", "GlobalProtect App 5.1.9", "GlobalProtect App 5.1.8", "GlobalProtect App 5.1.7", "GlobalProtect App 5.1.6", "GlobalProtect App 5.1.5", "GlobalProtect App 5.1.4", "GlobalProtect App 5.1.3", "GlobalProtect App 5.1.1", "GlobalProtect App 5.1.0", "GlobalProtect App 5.1" ], "x_likelyAffectedList": [ "GlobalProtect App 5.0.10", "GlobalProtect App 5.0.9", "GlobalProtect App 5.0.8", "GlobalProtect App 5.0.7", "GlobalProtect App 5.0.6", "GlobalProtect App 5.0.5", "GlobalProtect App 5.0.4", "GlobalProtect App 5.0.3", "GlobalProtect App 5.0.2", "GlobalProtect App 5.0.1", "GlobalProtect App 5.0.0", "GlobalProtect App 5.0", "GlobalProtect App 4.1.13", "GlobalProtect App 4.1.12", "GlobalProtect App 4.1.11", "GlobalProtect App 4.1.10", "GlobalProtect App 4.1.9", "GlobalProtect App 4.1.8", "GlobalProtect App 4.1.7", "GlobalProtect App 4.1.6", "GlobalProtect App 4.1.5", "GlobalProtect App 4.1.4", "GlobalProtect App 4.1.3", "GlobalProtect App 4.1.2", "GlobalProtect App 4.1.1", "GlobalProtect App 4.1.0", "GlobalProtect App 4.1", "GlobalProtect App 4.0.8", "GlobalProtect App 4.0.7", "GlobalProtect App 4.0.6", "GlobalProtect App 4.0.5", "GlobalProtect App 4.0.4", "GlobalProtect App 4.0.3", "GlobalProtect App 4.0.2", "GlobalProtect App 4.0.0", "GlobalProtect App 4.0", "GlobalProtect App 3.1.6", "GlobalProtect App 3.1.5", "GlobalProtect App 3.1.4", "GlobalProtect App 3.1.3", "GlobalProtect App 3.1.1", "GlobalProtect App 3.1.0", "GlobalProtect App 3.1", "GlobalProtect App 3.0.3", "GlobalProtect App 3.0.2", "GlobalProtect App 3.0.1", "GlobalProtect App 3.0.0", "GlobalProtect App 3.0", "GlobalProtect App 2.3.5", "GlobalProtect App 2.3.4", "GlobalProtect App 2.3.3", "GlobalProtect App 2.3.2", "GlobalProtect App 2.3.1", "GlobalProtect App 2.3.0", "GlobalProtect App 2.3", "GlobalProtect App 2.2.2", "GlobalProtect App 2.2.1", "GlobalProtect App 2.2.0", "GlobalProtect App 2.2", "GlobalProtect App 2.1.4", "GlobalProtect App 2.1.3", "GlobalProtect App 2.1.2", "GlobalProtect App 2.1.1", "GlobalProtect App 2.1.0", "GlobalProtect App 2.1", "GlobalProtect App 2.0.5", "GlobalProtect App 2.0.4", "GlobalProtect App 2.0.3", "GlobalProtect App 2.0.2", "GlobalProtect App 2.0.1", "GlobalProtect App 2.0.0", "GlobalProtect App 2.0", "GlobalProtect App 1.2.11", "GlobalProtect App 1.2.10", "GlobalProtect App 1.2.9", "GlobalProtect App 1.2.8", "GlobalProtect App 1.2.7", "GlobalProtect App 1.2.6", "GlobalProtect App 1.2.5", "GlobalProtect App 1.2.4", "GlobalProtect App 1.2.3", "GlobalProtect App 1.2.2", "GlobalProtect App 1.2.1", "GlobalProtect App 1.2.0", "GlobalProtect App 1.2", "GlobalProtect App 1.1.8", "GlobalProtect App 1.1.7", "GlobalProtect App 1.1.6", "GlobalProtect App 1.1.5", "GlobalProtect App 1.1.4", "GlobalProtect App 1.1.3", "GlobalProtect App 1.1.2", "GlobalProtect App 1.1.1", "GlobalProtect App 1.1.0", "GlobalProtect App 1.1", "GlobalProtect App 1.0.8", "GlobalProtect App 1.0.7", "GlobalProtect App 1.0.5", "GlobalProtect App 1.0.3", "GlobalProtect App 1.0.1", "GlobalProtect App 1.0" ] } } }, "cveMetadata": { "assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "assignerShortName": "palo_alto", "cveId": "CVE-2022-0017", "datePublished": "2022-02-10T18:10:18.618578Z", "dateReserved": "2021-12-28T00:00:00", "dateUpdated": "2024-09-16T17:58:01.158Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-1987
Vulnerability from cvelistv5
Published
2020-04-08 18:41
Modified
2024-09-16 19:14
Severity ?
EPSS score ?
Summary
An information exposure vulnerability in the logging component of Palo Alto Networks Global Protect Agent allows a local authenticated user to read VPN cookie information when the troubleshooting logging level is set to "Dump". This issue affects Palo Alto Networks Global Protect Agent 5.0 versions prior to 5.0.9; 5.1 versions prior to 5.1.1.
References
▼ | URL | Tags |
---|---|---|
https://security.paloaltonetworks.com/CVE-2020-1987 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Palo Alto Networks | Global Protect Agent |
Version: 5.0 < 5.0.9 Version: 5.1 < 5.1.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:54:00.525Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security.paloaltonetworks.com/CVE-2020-1987" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Global Protect Agent", "vendor": "Palo Alto Networks", "versions": [ { "changes": [ { "at": "5.0.9", "status": "unaffected" } ], "lessThan": "5.0.9", "status": "affected", "version": "5.0", "versionType": "custom" }, { "changes": [ { "at": "5.1.1", "status": "unaffected" } ], "lessThan": "5.1.1", "status": "affected", "version": "5.1", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Palo Alto Networks thanks Ahmet Hrnjadovic for discovering and reporting this issue." } ], "datePublic": "2020-04-08T00:00:00", "descriptions": [ { "lang": "en", "value": "An information exposure vulnerability in the logging component of Palo Alto Networks Global Protect Agent allows a local authenticated user to read VPN cookie information when the troubleshooting logging level is set to \"Dump\". This issue affects Palo Alto Networks Global Protect Agent 5.0 versions prior to 5.0.9; 5.1 versions prior to 5.1.1." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.9, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Information Exposure", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-04-08T18:41:58", "orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "shortName": "palo_alto" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security.paloaltonetworks.com/CVE-2020-1987" } ], "solutions": [ { "lang": "en", "value": "This issue is fixed in Global Protect Agent 5.0.9, Global Protect Agent 5.1.1 and all later versions." } ], "source": { "defect": [ "GPC-9393" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2020-04-08T00:00:00", "value": "Initial publication" } ], "title": "Global Protect Agent: VPN cookie local information disclosure", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@paloaltonetworks.com", "DATE_PUBLIC": "2020-04-08T16:00:00.000Z", "ID": "CVE-2020-1987", "STATE": "PUBLIC", "TITLE": "Global Protect Agent: VPN cookie local information disclosure" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Global Protect Agent", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "5.0", "version_value": "5.0.9" }, { "version_affected": "\u003c", "version_name": "5.1", "version_value": "5.1.1" }, { "version_affected": "!\u003e=", "version_name": "5.0", "version_value": "5.0.9" }, { "version_affected": "!\u003e=", "version_name": "5.1", "version_value": "5.1.1" } ] } } ] }, "vendor_name": "Palo Alto Networks" } ] } }, "credit": [ { "lang": "eng", "value": "Palo Alto Networks thanks Ahmet Hrnjadovic for discovering and reporting this issue." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An information exposure vulnerability in the logging component of Palo Alto Networks Global Protect Agent allows a local authenticated user to read VPN cookie information when the troubleshooting logging level is set to \"Dump\". This issue affects Palo Alto Networks Global Protect Agent 5.0 versions prior to 5.0.9; 5.1 versions prior to 5.1.1." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.9, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-200 Information Exposure" } ] } ] }, "references": { "reference_data": [ { "name": "https://security.paloaltonetworks.com/CVE-2020-1987", "refsource": "MISC", "url": "https://security.paloaltonetworks.com/CVE-2020-1987" } ] }, "solution": [ { "lang": "en", "value": "This issue is fixed in Global Protect Agent 5.0.9, Global Protect Agent 5.1.1 and all later versions." } ], "source": { "defect": [ "GPC-9393" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2020-04-08T00:00:00", "value": "Initial publication" } ] } } }, "cveMetadata": { "assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "assignerShortName": "palo_alto", "cveId": "CVE-2020-1987", "datePublished": "2020-04-08T18:41:58.380348Z", "dateReserved": "2019-12-04T00:00:00", "dateUpdated": "2024-09-16T19:14:19.257Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-5908
Vulnerability from cvelistv5
Published
2024-06-12 16:28
Modified
2024-08-09 19:08
Severity ?
EPSS score ?
Summary
A problem with the Palo Alto Networks GlobalProtect app can result in exposure of encrypted user credentials, used for connecting to GlobalProtect, in application logs. Normally, these application logs are only viewable by local users and are included when generating logs for troubleshooting purposes. This means that these encrypted credentials are exposed to recipients of the application logs.
References
▼ | URL | Tags |
---|---|---|
https://security.paloaltonetworks.com/CVE-2024-5908 | vendor-advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Palo Alto Networks | GlobalProtect App |
Version: 5.1.0 < 5.1.12 Version: 6.0.0 < 6.0.8 Version: 6.1.0 < 6.1.3 Version: 6.2.0 < 6.2.3 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T21:25:03.175Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.paloaltonetworks.com/CVE-2024-5908" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:paloaltonetworks:globalprotect:5.1:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "globalprotect", "vendor": "paloaltonetworks", "versions": [ { "lessThan": "5.1.12", "status": "affected", "version": "5.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:paloaltonetworks:globalprotect:6.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "globalprotect", "vendor": "paloaltonetworks", "versions": [ { "lessThan": "6.0.8", "status": "affected", "version": "6.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:paloaltonetworks:globalprotect:6.1.0:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "globalprotect", "vendor": "paloaltonetworks", "versions": [ { "lessThan": "6.1.3", "status": "affected", "version": "6.1.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:paloaltonetworks:globalprotect:6.2.0:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "globalprotect", "vendor": "paloaltonetworks", "versions": [ { "lessThan": "6.2.3", "status": "affected", "version": "6.2.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-5908", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-08-09T18:53:54.949374Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-09T19:08:25.260Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "GlobalProtect App", "vendor": "Palo Alto Networks", "versions": [ { "changes": [ { "at": "5.1.12", "status": "unaffected" } ], "lessThan": "5.1.12", "status": "affected", "version": "5.1.0", "versionType": "custom" }, { "changes": [ { "at": "6.0.8", "status": "unaffected" } ], "lessThan": "6.0.8", "status": "affected", "version": "6.0.0", "versionType": "custom" }, { "changes": [ { "at": "6.1.3", "status": "unaffected" } ], "lessThan": "6.1.3", "status": "affected", "version": "6.1.0", "versionType": "custom" }, { "changes": [ { "at": "6.2.3", "status": "unaffected" } ], "lessThan": "6.2.3", "status": "affected", "version": "6.2.0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Palo Alto Networks thanks Denis Faiustov and Ruslan Sayfiev of GMO Cybersecurity by IERAE for discovering and reporting this issue." } ], "datePublic": "2024-06-12T07:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eA problem with the Palo Alto Networks GlobalProtect app can result in exposure of encrypted user credentials, used for connecting to GlobalProtect, in application logs. Normally, these application logs are only viewable by local users and are included when generating logs for troubleshooting purposes. This means that these encrypted credentials are exposed to recipients of the application logs.\u003c/p\u003e" } ], "value": "A problem with the Palo Alto Networks GlobalProtect app can result in exposure of encrypted user credentials, used for connecting to GlobalProtect, in application logs. Normally, these application logs are only viewable by local users and are included when generating logs for troubleshooting purposes. This means that these encrypted credentials are exposed to recipients of the application logs." } ], "exploits": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003ePalo Alto Networks is not aware of any malicious exploitation of this issue.\u003c/p\u003e" } ], "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue." } ], "impacts": [ { "capecId": "CAPEC-150", "descriptions": [ { "lang": "en", "value": "CAPEC-150 Collect Data from Common Resource Locations" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NO", "Recovery": "USER", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "PRESENT", "attackVector": "NETWORK", "baseScore": 5.5, "baseSeverity": "MEDIUM", "privilegesRequired": "NONE", "providerUrgency": "AMBER", "subAvailabilityImpact": "HIGH", "subConfidentialityImpact": "HIGH", "subIntegrityImpact": "HIGH", "userInteraction": "ACTIVE", "valueDensity": "DIFFUSE", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:N/VA:N/SC:H/SI:H/SA:H/AU:N/R:U/V:D/RE:M/U:Amber", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "NONE", "vulnerabilityResponseEffort": "MODERATE" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-532", "description": "CWE-532: Insertion of Sensitive Information into Log File", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-12T16:28:08.131Z", "orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "shortName": "palo_alto" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2024-5908" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eThis issue is fixed in GlobalProtect app 5.1.12, GlobalProtect app 6.0.8, GlobalProtect app 6.1.3, GlobalProtect app 6.2.3, and all later GlobalProtect app versions.\u003c/p\u003e\u003cp\u003eCustomers looking to protect against the impact of this encrypted password disclosure should first delete PanGPS.log files from the GlobalProtect installation directory on all endpoints and then force a rotation of user passwords that are used to connect to GlobalProtect.\u003c/p\u003e" } ], "value": "This issue is fixed in GlobalProtect app 5.1.12, GlobalProtect app 6.0.8, GlobalProtect app 6.1.3, GlobalProtect app 6.2.3, and all later GlobalProtect app versions.\n\nCustomers looking to protect against the impact of this encrypted password disclosure should first delete PanGPS.log files from the GlobalProtect installation directory on all endpoints and then force a rotation of user passwords that are used to connect to GlobalProtect." } ], "source": { "defect": [ "GPC-18597" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2024-06-12T16:00:00.000Z", "value": "Initial publication" } ], "title": "GlobalProtect App: Encrypted Credential Exposure via Log Files", "x_generator": { "engine": "vulnogram 0.1.0-rc1" }, "x_legacyV4Record": { "CNA_private": { "Priority": "normal", "STATE": "review", "TYPE": "advisory", "affectsSummary": { "affected": [ "\u003c 6.2.3", "\u003c 6.1.3", "\u003c 6.0.8", "\u003c 5.1.12" ], "appliesTo": [ "GlobalProtect App 6.2", "GlobalProtect App 6.1", "GlobalProtect App 6.0", "GlobalProtect App 5.1" ], "product_versions": [ "GlobalProtect App 6.2", "GlobalProtect App 6.1", "GlobalProtect App 6.0", "GlobalProtect App 5.1" ], "unaffected": [ "\u003e= 6.2.3", "\u003e= 6.1.3", "\u003e= 6.0.8", "\u003e= 5.1.12" ], "unknown": [ "", "", "", "" ] }, "owner": "carjones", "publish": { "month": "06", "year": "2024", "ym": "2024-06" }, "share_with_CVE": true, "show_cvss": true }, "CVE_data_meta": { "ASSIGNER": "psirt@paloaltonetworks.com", "DATE_PUBLIC": "2024-06-12T16:00:00.000Z", "ID": "CVE-2023-case-GPC-18597", "STATE": "PUBLIC", "TITLE": "GlobalProtect App: Encrypted Credential Exposure via Log Files" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "GlobalProtect App", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "5.1", "version_value": "5.1.12" }, { "version_affected": "\u003c", "version_name": "6.0", "version_value": "6.0.8" }, { "version_affected": "\u003c", "version_name": "6.1", "version_value": "6.1.3" }, { "version_affected": "\u003c", "version_name": "6.2", "version_value": "6.2.3" }, { "version_affected": "!\u003e=", "version_name": "5.1", "version_value": "5.1.12" }, { "version_affected": "!\u003e=", "version_name": "6.0", "version_value": "6.0.8" }, { "version_affected": "!\u003e=", "version_name": "6.1", "version_value": "6.1.3" }, { "version_affected": "!\u003e=", "version_name": "6.2", "version_value": "6.2.3" } ] } } ] }, "vendor_name": "Palo Alto Networks" } ] } }, "credit": [ { "lang": "eng", "value": "Palo Alto Networks thanks Denis Faiustov and Ruslan Sayfiev of GMO Cybersecurity by IERAE for discovering and reporting this issue." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A problem with the Palo Alto Networks GlobalProtect app can result in exposure of encrypted user credentials, used for connecting to GlobalProtect, in application logs. Normally, these application logs are only viewable by local users and are included when generating logs for troubleshooting purposes. This means that these encrypted credentials are exposed to recipients of the application logs." } ] }, "exploit": [ { "lang": "en", "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue." } ], "generator": { "engine": "vulnogram 0.1.0-rc1" }, "impact": { "cvss": { "Automatable": "NO", "Recovery": "USER", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "PRESENT", "attackVector": "NETWORK", "baseScore": 5.5, "baseSeverity": "MEDIUM", "privilegesRequired": "NONE", "providerUrgency": "AMBER", "subAvailabilityImpact": "HIGH", "subConfidentialityImpact": "HIGH", "subIntegrityImpact": "HIGH", "userInteraction": "ACTIVE", "valueDensity": "DIFFUSE", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:N/VA:N/SC:H/SI:H/SA:H/AU:N/R:U/V:D/RE:M/U:Amber", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "NONE", "vulnerabilityResponseEffort": "MODERATE" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-532: Insertion of Sensitive Information into Log File" } ] } ] }, "references": { "reference_data": [ { "refsource": "CONFIRM", "url": "https://security.paloaltonetworks.com/CVE-2023-case-GPC-18597" } ] }, "solution": [ { "lang": "en", "value": "This issue is fixed in GlobalProtect app 5.1.12, GlobalProtect app 6.0.8, GlobalProtect app 6.1.3, GlobalProtect app 6.2.3, and all later GlobalProtect app versions.Customers looking to protect against the impact of this encrypted password disclosure should first delete PanGPS.log files from the GlobalProtect installation directory on all endpoints and then force a rotation of user passwords that are used to connect to GlobalProtect." } ], "source": { "defect": [ "GPC-18597" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2024-06-12T00:00:00", "value": "Initial publication" } ], "x_advisoryEoL": false } } }, "cveMetadata": { "assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "assignerShortName": "palo_alto", "cveId": "CVE-2024-5908", "datePublished": "2024-06-12T16:28:08.131Z", "dateReserved": "2024-06-12T15:27:55.490Z", "dateUpdated": "2024-08-09T19:08:25.260Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-2004
Vulnerability from cvelistv5
Published
2020-05-13 19:07
Modified
2024-09-17 01:30
Severity ?
EPSS score ?
Summary
Under certain circumstances a user's password may be logged in cleartext in the PanGPS.log diagnostic file when logs are collected for troubleshooting on GlobalProtect app (also known as GlobalProtect Agent) for MacOS and Windows. For this issue to occur all of these conditions must be true: (1) 'Save User Credential' option should be set to 'Yes' in the GlobalProtect Portal's Agent configuration, (2) the GlobalProtect user manually selects a gateway, (3) and the logging level is set to 'Dump' while collecting troubleshooting logs. This issue does not affect GlobalProtect app on other platforms (for example iOS/Android/Linux). This issue affects GlobalProtect app 5.0 versions earlier than 5.0.9, GlobalProtect app 5.1 versions earlier than 5.1.2 on Windows or MacOS. Since becoming aware of the issue, Palo Alto Networks has safely deleted all the known GlobalProtectLogs zip files sent by customers with the credentials. We now filter and remove these credentials from all files sent to Customer Support. The GlobalProtectLogs zip files uploaded to Palo Alto Networks systems were only accessible by authorized personnel with valid Palo Alto Networks credentials. We do not have any evidence of malicious access or use of these credentials.
References
▼ | URL | Tags |
---|---|---|
https://security.paloaltonetworks.com/CVE-2020-2004 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | Palo Alto Networks | GlobalProtect App |
Version: 5.0 < 5.0.9 Version: 5.1 < 5.1.2 |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:54:00.539Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security.paloaltonetworks.com/CVE-2020-2004" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Windows and MacOS" ], "product": "GlobalProtect App", "vendor": "Palo Alto Networks", "versions": [ { "lessThan": "5.0.9", "status": "affected", "version": "5.0", "versionType": "custom" }, { "lessThan": "5.1.2", "status": "affected", "version": "5.1", "versionType": "custom" } ] }, { "product": "GlobalProtect App", "vendor": "Palo Alto Networks", "versions": [ { "lessThan": "5.0*", "status": "unaffected", "version": "5.0.9", "versionType": "custom" }, { "lessThan": "5.1*", "status": "unaffected", "version": "5.1.2", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "This issue was found by Navin Vasan of Palo Alto Networks during internal security review." } ], "datePublic": "2020-05-13T00:00:00", "descriptions": [ { "lang": "en", "value": "Under certain circumstances a user\u0027s password may be logged in cleartext in the PanGPS.log diagnostic file when logs are collected for troubleshooting on GlobalProtect app (also known as GlobalProtect Agent) for MacOS and Windows. For this issue to occur all of these conditions must be true: (1) \u0027Save User Credential\u0027 option should be set to \u0027Yes\u0027 in the GlobalProtect Portal\u0027s Agent configuration, (2) the GlobalProtect user manually selects a gateway, (3) and the logging level is set to \u0027Dump\u0027 while collecting troubleshooting logs. This issue does not affect GlobalProtect app on other platforms (for example iOS/Android/Linux). This issue affects GlobalProtect app 5.0 versions earlier than 5.0.9, GlobalProtect app 5.1 versions earlier than 5.1.2 on Windows or MacOS. Since becoming aware of the issue, Palo Alto Networks has safely deleted all the known GlobalProtectLogs zip files sent by customers with the credentials. We now filter and remove these credentials from all files sent to Customer Support. The GlobalProtectLogs zip files uploaded to Palo Alto Networks systems were only accessible by authorized personnel with valid Palo Alto Networks credentials. We do not have any evidence of malicious access or use of these credentials." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-534", "description": "CWE-534 Information Exposure Through Debug Log Files", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-05-13T19:07:14", "orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "shortName": "palo_alto" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security.paloaltonetworks.com/CVE-2020-2004" } ], "solutions": [ { "lang": "en", "value": "This issue is fixed in GlobalProtect app 5.0.9; GlobalProtect app 5.1.2; and all later GlobalProtect app versions.\n\nGlobalProtect app 4.1 is now End-of-life as of March 1, 2020 and is no longer covered by our Product Security Assurance policies." } ], "source": { "defect": [ "GPC-10404" ], "discovery": "INTERNAL" }, "timeline": [ { "lang": "en", "time": "2020-05-13T00:00:00", "value": "Initial publication" } ], "title": "GlobalProtect App: Passwords may be logged in clear text while collecting troubleshooting logs", "workarounds": [ { "lang": "en", "value": "Multiple workarounds exists for this issue:\n1. Do not set the \u0027Logging Level\u0027 option to \u0027Dump\u0027 while collecting troubleshooting logs. This issue does not occur when the \u0027Logging Level\u0027 is set to \u0027Debug\u0027.\n2. Set the \u0027Save User Credential\u0027 option to \u0027No\u0027 in the GlobalProtect Portal\u0027s Agent configuration.\n3. Use Single-Sign-On (SSO) feature instead of the \u2018Save User Credential\u2019 option." } ], "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@paloaltonetworks.com", "DATE_PUBLIC": "2020-05-13T16:00:00.000Z", "ID": "CVE-2020-2004", "STATE": "PUBLIC", "TITLE": "GlobalProtect App: Passwords may be logged in clear text while collecting troubleshooting logs" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "GlobalProtect App", "version": { "version_data": [ { "platform": "Windows and MacOS", "version_affected": "\u003c", "version_name": "5.0", "version_value": "5.0.9" }, { "platform": "Windows and MacOS", "version_affected": "\u003c", "version_name": "5.1", "version_value": "5.1.2" }, { "version_affected": "!\u003e=", "version_name": "5.0", "version_value": "5.0.9" }, { "version_affected": "!\u003e=", "version_name": "5.1", "version_value": "5.1.2" } ] } } ] }, "vendor_name": "Palo Alto Networks" } ] } }, "credit": [ { "lang": "eng", "value": "This issue was found by Navin Vasan of Palo Alto Networks during internal security review." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Under certain circumstances a user\u0027s password may be logged in cleartext in the PanGPS.log diagnostic file when logs are collected for troubleshooting on GlobalProtect app (also known as GlobalProtect Agent) for MacOS and Windows. For this issue to occur all of these conditions must be true: (1) \u0027Save User Credential\u0027 option should be set to \u0027Yes\u0027 in the GlobalProtect Portal\u0027s Agent configuration, (2) the GlobalProtect user manually selects a gateway, (3) and the logging level is set to \u0027Dump\u0027 while collecting troubleshooting logs. This issue does not affect GlobalProtect app on other platforms (for example iOS/Android/Linux). This issue affects GlobalProtect app 5.0 versions earlier than 5.0.9, GlobalProtect app 5.1 versions earlier than 5.1.2 on Windows or MacOS. Since becoming aware of the issue, Palo Alto Networks has safely deleted all the known GlobalProtectLogs zip files sent by customers with the credentials. We now filter and remove these credentials from all files sent to Customer Support. The GlobalProtectLogs zip files uploaded to Palo Alto Networks systems were only accessible by authorized personnel with valid Palo Alto Networks credentials. We do not have any evidence of malicious access or use of these credentials." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-534 Information Exposure Through Debug Log Files" } ] } ] }, "references": { "reference_data": [ { "name": "https://security.paloaltonetworks.com/CVE-2020-2004", "refsource": "MISC", "url": "https://security.paloaltonetworks.com/CVE-2020-2004" } ] }, "solution": [ { "lang": "en", "value": "This issue is fixed in GlobalProtect app 5.0.9; GlobalProtect app 5.1.2; and all later GlobalProtect app versions.\n\nGlobalProtect app 4.1 is now End-of-life as of March 1, 2020 and is no longer covered by our Product Security Assurance policies." } ], "source": { "defect": [ "GPC-10404" ], "discovery": "INTERNAL" }, "timeline": [ { "lang": "en", "time": "2020-05-13T00:00:00", "value": "Initial publication" } ], "work_around": [ { "lang": "en", "value": "Multiple workarounds exists for this issue:\n1. Do not set the \u0027Logging Level\u0027 option to \u0027Dump\u0027 while collecting troubleshooting logs. This issue does not occur when the \u0027Logging Level\u0027 is set to \u0027Debug\u0027.\n2. Set the \u0027Save User Credential\u0027 option to \u0027No\u0027 in the GlobalProtect Portal\u0027s Agent configuration.\n3. Use Single-Sign-On (SSO) feature instead of the \u2018Save User Credential\u2019 option." } ] } } }, "cveMetadata": { "assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "assignerShortName": "palo_alto", "cveId": "CVE-2020-2004", "datePublished": "2020-05-13T19:07:14.220187Z", "dateReserved": "2019-12-04T00:00:00", "dateUpdated": "2024-09-17T01:30:43.892Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-0021
Vulnerability from cvelistv5
Published
2022-02-10 18:10
Modified
2024-09-16 19:20
Severity ?
EPSS score ?
Summary
An information exposure through log file vulnerability exists in the Palo Alto Networks GlobalProtect app on Windows that logs the cleartext credentials of the connecting GlobalProtect user when authenticating using Connect Before Logon feature. This issue impacts GlobalProtect App 5.2 versions earlier than 5.2.9 on Windows. This issue does not affect the GlobalProtect app on other platforms.
References
▼ | URL | Tags |
---|---|---|
https://security.paloaltonetworks.com/CVE-2022-0021 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | Palo Alto Networks | GlobalProtect App |
Version: 5.2 < 5.2.9 |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:18:41.334Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security.paloaltonetworks.com/CVE-2022-0021" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Windows" ], "product": "GlobalProtect App", "vendor": "Palo Alto Networks", "versions": [ { "changes": [ { "at": "5.2.9", "status": "unaffected" } ], "lessThan": "5.2.9", "status": "affected", "version": "5.2", "versionType": "custom" } ] }, { "product": "GlobalProtect App", "vendor": "Palo Alto Networks", "versions": [ { "status": "unaffected", "version": "5.1.*" }, { "status": "unaffected", "version": "5.3.*" } ] } ], "configurations": [ { "lang": "en", "value": "This issue is applicable only to devices configured to use the GlobalProtect Connect Before Logon feature." } ], "credits": [ { "lang": "en", "value": "This issue was found by Rutger Truyers of Palo Alto Networks during internal security review." } ], "datePublic": "2022-02-09T00:00:00", "descriptions": [ { "lang": "en", "value": "An information exposure through log file vulnerability exists in the Palo Alto Networks GlobalProtect app on Windows that logs the cleartext credentials of the connecting GlobalProtect user when authenticating using Connect Before Logon feature. This issue impacts GlobalProtect App 5.2 versions earlier than 5.2.9 on Windows. This issue does not affect the GlobalProtect app on other platforms." } ], "exploits": [ { "lang": "en", "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-532", "description": "CWE-532 Information Exposure Through Log Files", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-10T18:10:24", "orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "shortName": "palo_alto" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security.paloaltonetworks.com/CVE-2022-0021" } ], "solutions": [ { "lang": "en", "value": "This issue is fixed in GlobalProtect app 5.2.9 on Windows and all later GlobalProtect app versions." } ], "source": { "defect": [ "GPC-13888" ], "discovery": "INTERNAL" }, "timeline": [ { "lang": "en", "time": "2022-02-09T00:00:00", "value": "Initial publication" } ], "title": "GlobalProtect App: Information Exposure Vulnerability When Using Connect Before Logon", "workarounds": [ { "lang": "en", "value": "There are no known workarounds for this issue." } ], "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@paloaltonetworks.com", "DATE_PUBLIC": "2022-02-09T17:00:00.000Z", "ID": "CVE-2022-0021", "STATE": "PUBLIC", "TITLE": "GlobalProtect App: Information Exposure Vulnerability When Using Connect Before Logon" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "GlobalProtect App", "version": { "version_data": [ { "platform": "Windows", "version_affected": "\u003c", "version_name": "5.2", "version_value": "5.2.9" }, { "platform": "Windows", "version_affected": "!\u003e=", "version_name": "5.2", "version_value": "5.2.9" }, { "version_affected": "!", "version_name": "5.1", "version_value": "5.1.*" }, { "version_affected": "!", "version_name": "5.3", "version_value": "5.3.*" } ] } } ] }, "vendor_name": "Palo Alto Networks" } ] } }, "configuration": [ { "lang": "en", "value": "This issue is applicable only to devices configured to use the GlobalProtect Connect Before Logon feature." } ], "credit": [ { "lang": "eng", "value": "This issue was found by Rutger Truyers of Palo Alto Networks during internal security review." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An information exposure through log file vulnerability exists in the Palo Alto Networks GlobalProtect app on Windows that logs the cleartext credentials of the connecting GlobalProtect user when authenticating using Connect Before Logon feature. This issue impacts GlobalProtect App 5.2 versions earlier than 5.2.9 on Windows. This issue does not affect the GlobalProtect app on other platforms." } ] }, "exploit": [ { "lang": "en", "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue." } ], "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-532 Information Exposure Through Log Files" } ] } ] }, "references": { "reference_data": [ { "name": "https://security.paloaltonetworks.com/CVE-2022-0021", "refsource": "MISC", "url": "https://security.paloaltonetworks.com/CVE-2022-0021" } ] }, "solution": [ { "lang": "en", "value": "This issue is fixed in GlobalProtect app 5.2.9 on Windows and all later GlobalProtect app versions." } ], "source": { "defect": [ "GPC-13888" ], "discovery": "INTERNAL" }, "timeline": [ { "lang": "en", "time": "2022-02-09T00:00:00", "value": "Initial publication" } ], "work_around": [ { "lang": "en", "value": "There are no known workarounds for this issue." } ], "x_advisoryEoL": true, "x_affectedList": [ "GlobalProtect App 5.2.8", "GlobalProtect App 5.2.7", "GlobalProtect App 5.2.6", "GlobalProtect App 5.2.5", "GlobalProtect App 5.2.4", "GlobalProtect App 5.2.3", "GlobalProtect App 5.2.2", "GlobalProtect App 5.2.1", "GlobalProtect App 5.2.0", "GlobalProtect App 5.2" ], "x_likelyAffectedList": [ "GlobalProtect App 5.0.10", "GlobalProtect App 5.0.9", "GlobalProtect App 5.0.8", "GlobalProtect App 5.0.7", "GlobalProtect App 5.0.6", "GlobalProtect App 5.0.5", "GlobalProtect App 5.0.4", "GlobalProtect App 5.0.3", "GlobalProtect App 5.0.2", "GlobalProtect App 5.0.1", "GlobalProtect App 5.0.0", "GlobalProtect App 5.0", "GlobalProtect App 4.1.13", "GlobalProtect App 4.1.12", "GlobalProtect App 4.1.11", "GlobalProtect App 4.1.10", "GlobalProtect App 4.1.9", "GlobalProtect App 4.1.8", "GlobalProtect App 4.1.7", "GlobalProtect App 4.1.6", "GlobalProtect App 4.1.5", "GlobalProtect App 4.1.4", "GlobalProtect App 4.1.3", "GlobalProtect App 4.1.2", "GlobalProtect App 4.1.1", "GlobalProtect App 4.1.0", "GlobalProtect App 4.1", "GlobalProtect App 4.0.8", "GlobalProtect App 4.0.7", "GlobalProtect App 4.0.6", "GlobalProtect App 4.0.5", "GlobalProtect App 4.0.4", "GlobalProtect App 4.0.3", "GlobalProtect App 4.0.2", "GlobalProtect App 4.0.0", "GlobalProtect App 4.0", "GlobalProtect App 3.1.6", "GlobalProtect App 3.1.5", "GlobalProtect App 3.1.4", "GlobalProtect App 3.1.3", "GlobalProtect App 3.1.1", "GlobalProtect App 3.1.0", "GlobalProtect App 3.1", "GlobalProtect App 3.0.3", "GlobalProtect App 3.0.2", "GlobalProtect App 3.0.1", "GlobalProtect App 3.0.0", "GlobalProtect App 3.0", "GlobalProtect App 2.3.5", "GlobalProtect App 2.3.4", "GlobalProtect App 2.3.3", "GlobalProtect App 2.3.2", "GlobalProtect App 2.3.1", "GlobalProtect App 2.3.0", "GlobalProtect App 2.3", "GlobalProtect App 2.2.2", "GlobalProtect App 2.2.1", "GlobalProtect App 2.2.0", "GlobalProtect App 2.2", "GlobalProtect App 2.1.4", "GlobalProtect App 2.1.3", "GlobalProtect App 2.1.2", "GlobalProtect App 2.1.1", "GlobalProtect App 2.1.0", "GlobalProtect App 2.1", "GlobalProtect App 2.0.5", "GlobalProtect App 2.0.4", "GlobalProtect App 2.0.3", "GlobalProtect App 2.0.2", "GlobalProtect App 2.0.1", "GlobalProtect App 2.0.0", "GlobalProtect App 2.0", "GlobalProtect App 1.2.11", "GlobalProtect App 1.2.10", "GlobalProtect App 1.2.9", "GlobalProtect App 1.2.8", "GlobalProtect App 1.2.7", "GlobalProtect App 1.2.6", "GlobalProtect App 1.2.5", "GlobalProtect App 1.2.4", "GlobalProtect App 1.2.3", "GlobalProtect App 1.2.2", "GlobalProtect App 1.2.1", "GlobalProtect App 1.2.0", "GlobalProtect App 1.2", "GlobalProtect App 1.1.8", "GlobalProtect App 1.1.7", "GlobalProtect App 1.1.6", "GlobalProtect App 1.1.5", "GlobalProtect App 1.1.4", "GlobalProtect App 1.1.3", "GlobalProtect App 1.1.2", "GlobalProtect App 1.1.1", "GlobalProtect App 1.1.0", "GlobalProtect App 1.1", "GlobalProtect App 1.0.8", "GlobalProtect App 1.0.7", "GlobalProtect App 1.0.5", "GlobalProtect App 1.0.3", "GlobalProtect App 1.0.1", "GlobalProtect App 1.0" ] } } }, "cveMetadata": { "assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "assignerShortName": "palo_alto", "cveId": "CVE-2022-0021", "datePublished": "2022-02-10T18:10:24.695182Z", "dateReserved": "2021-12-28T00:00:00", "dateUpdated": "2024-09-16T19:20:33.408Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-3057
Vulnerability from cvelistv5
Published
2021-10-13 16:10
Modified
2024-09-17 01:35
Severity ?
EPSS score ?
Summary
A stack-based buffer overflow vulnerability exists in the Palo Alto Networks GlobalProtect app that enables a man-in-the-middle attacker to disrupt system processes and potentially execute arbitrary code with SYSTEM privileges. This issue impacts: GlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.9 on Windows; GlobalProtect app 5.2 versions earlier than GlobalProtect app 5.2.8 on Windows; GlobalProtect app 5.2 versions earlier than GlobalProtect app 5.2.8 on the Universal Windows Platform; GlobalProtect app 5.3 versions earlier than GlobalProtect app 5.3.1 on Linux.
References
▼ | URL | Tags |
---|---|---|
https://security.paloaltonetworks.com/CVE-2021-3057 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Palo Alto Networks | GlobalProtect App |
Version: 5.1 < 5.1.9 Version: 5.2 < 5.2.8 |
||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T16:45:51.156Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security.paloaltonetworks.com/CVE-2021-3057" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Windows" ], "product": "GlobalProtect App", "vendor": "Palo Alto Networks", "versions": [ { "changes": [ { "at": "5.1.9", "status": "unaffected" } ], "lessThan": "5.1.9", "status": "affected", "version": "5.1", "versionType": "custom" }, { "changes": [ { "at": "5.2.8", "status": "unaffected" } ], "lessThan": "5.2.8", "status": "affected", "version": "5.2", "versionType": "custom" } ] }, { "platforms": [ "Linux" ], "product": "GlobalProtect App", "vendor": "Palo Alto Networks", "versions": [ { "changes": [ { "at": "5.3.1", "status": "unaffected" } ], "lessThan": "5.3.1", "status": "affected", "version": "5.3", "versionType": "custom" } ] }, { "platforms": [ "Universal Windows Platform" ], "product": "GlobalProtect App", "vendor": "Palo Alto Networks", "versions": [ { "changes": [ { "at": "5.2.8", "status": "unaffected" } ], "lessThan": "5.2.8", "status": "affected", "version": "5.2", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Palo Alto Networks thanks Tomas Rzepka of F-Secure for discovering and reporting this issue." } ], "datePublic": "2021-10-13T00:00:00", "descriptions": [ { "lang": "en", "value": "A stack-based buffer overflow vulnerability exists in the Palo Alto Networks GlobalProtect app that enables a man-in-the-middle attacker to disrupt system processes and potentially execute arbitrary code with SYSTEM privileges. This issue impacts: GlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.9 on Windows; GlobalProtect app 5.2 versions earlier than GlobalProtect app 5.2.8 on Windows; GlobalProtect app 5.2 versions earlier than GlobalProtect app 5.2.8 on the Universal Windows Platform; GlobalProtect app 5.3 versions earlier than GlobalProtect app 5.3.1 on Linux." } ], "exploits": [ { "lang": "en", "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-121", "description": "CWE-121 Stack-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-13T16:10:10", "orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "shortName": "palo_alto" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security.paloaltonetworks.com/CVE-2021-3057" } ], "solutions": [ { "lang": "en", "value": "This issue is fixed in GlobalProtect app 5.1.9 on Windows, GlobalProtect app 5.2.8 on Windows and on Universal Windows Platform, GlobalProtect app 5.3.1 on Linux, and all later GlobalProtect app versions." } ], "source": { "defect": [ "GPC-13039" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2021-10-13T00:00:00", "value": "Initial publication" } ], "title": "GlobalProtect App: Buffer Overflow Vulnerability When Connecting to Portal or Gateway", "workarounds": [ { "lang": "en", "value": "There are no known workarounds for this issue." } ], "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@paloaltonetworks.com", "DATE_PUBLIC": "2021-10-13T16:00:00.000Z", "ID": "CVE-2021-3057", "STATE": "PUBLIC", "TITLE": "GlobalProtect App: Buffer Overflow Vulnerability When Connecting to Portal or Gateway" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "GlobalProtect App", "version": { "version_data": [ { "platform": "Windows", "version_affected": "\u003c", "version_name": "5.1", "version_value": "5.1.9" }, { "platform": "Windows", "version_affected": "\u003c", "version_name": "5.2", "version_value": "5.2.8" }, { "platform": "Linux", "version_affected": "\u003c", "version_name": "5.3", "version_value": "5.3.1" }, { "platform": "Windows", "version_affected": "!\u003e=", "version_name": "5.1", "version_value": "5.1.9" }, { "platform": "Windows", "version_affected": "!\u003e=", "version_name": "5.2", "version_value": "5.2.8" }, { "platform": "Linux", "version_affected": "!\u003e=", "version_name": "5.3", "version_value": "5.3.1" }, { "platform": "Universal Windows Platform", "version_affected": "\u003c", "version_name": "5.2", "version_value": "5.2.8" }, { "platform": "Universal Windows Platform", "version_affected": "!\u003e=", "version_name": "5.2", "version_value": "5.2.8" } ] } } ] }, "vendor_name": "Palo Alto Networks" } ] } }, "credit": [ { "lang": "eng", "value": "Palo Alto Networks thanks Tomas Rzepka of F-Secure for discovering and reporting this issue." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A stack-based buffer overflow vulnerability exists in the Palo Alto Networks GlobalProtect app that enables a man-in-the-middle attacker to disrupt system processes and potentially execute arbitrary code with SYSTEM privileges. This issue impacts: GlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.9 on Windows; GlobalProtect app 5.2 versions earlier than GlobalProtect app 5.2.8 on Windows; GlobalProtect app 5.2 versions earlier than GlobalProtect app 5.2.8 on the Universal Windows Platform; GlobalProtect app 5.3 versions earlier than GlobalProtect app 5.3.1 on Linux." } ] }, "exploit": [ { "lang": "en", "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue." } ], "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-121 Stack-based Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://security.paloaltonetworks.com/CVE-2021-3057", "refsource": "MISC", "url": "https://security.paloaltonetworks.com/CVE-2021-3057" } ] }, "solution": [ { "lang": "en", "value": "This issue is fixed in GlobalProtect app 5.1.9 on Windows, GlobalProtect app 5.2.8 on Windows and on Universal Windows Platform, GlobalProtect app 5.3.1 on Linux, and all later GlobalProtect app versions." } ], "source": { "defect": [ "GPC-13039" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2021-10-13T00:00:00", "value": "Initial publication" } ], "work_around": [ { "lang": "en", "value": "There are no known workarounds for this issue." } ], "x_advisoryEoL": true, "x_affectedList": [ "GlobalProtect App 5.3.0", "GlobalProtect App 5.3", "GlobalProtect App 5.2.7", "GlobalProtect App 5.2.6", "GlobalProtect App 5.2.5", "GlobalProtect App 5.2.4", "GlobalProtect App 5.2.3", "GlobalProtect App 5.2.2", "GlobalProtect App 5.2.1", "GlobalProtect App 5.2.0", "GlobalProtect App 5.2", "GlobalProtect App 5.1.8", "GlobalProtect App 5.1.7", "GlobalProtect App 5.1.6", "GlobalProtect App 5.1.5", "GlobalProtect App 5.1.4", "GlobalProtect App 5.1.3", "GlobalProtect App 5.1.1", "GlobalProtect App 5.1.0", "GlobalProtect App 5.1" ], "x_likelyAffectedList": [ "GlobalProtect App 5.0.10", "GlobalProtect App 5.0.9", "GlobalProtect App 5.0.8", "GlobalProtect App 5.0.7", "GlobalProtect App 5.0.6", "GlobalProtect App 5.0.5", "GlobalProtect App 5.0.4", "GlobalProtect App 5.0.3", "GlobalProtect App 5.0.2", "GlobalProtect App 5.0.1", "GlobalProtect App 5.0.0", "GlobalProtect App 5.0", "GlobalProtect App 4.1.13", "GlobalProtect App 4.1.12", "GlobalProtect App 4.1.11", "GlobalProtect App 4.1.10", "GlobalProtect App 4.1.9", "GlobalProtect App 4.1.8", "GlobalProtect App 4.1.7", "GlobalProtect App 4.1.6", "GlobalProtect App 4.1.5", "GlobalProtect App 4.1.4", "GlobalProtect App 4.1.3", "GlobalProtect App 4.1.2", "GlobalProtect App 4.1.1", "GlobalProtect App 4.1.0", "GlobalProtect App 4.1", "GlobalProtect App 4.0.8", "GlobalProtect App 4.0.7", "GlobalProtect App 4.0.6", "GlobalProtect App 4.0.5", "GlobalProtect App 4.0.4", "GlobalProtect App 4.0.3", "GlobalProtect App 4.0.2", "GlobalProtect App 4.0.0", "GlobalProtect App 4.0", "GlobalProtect App 3.1.6", "GlobalProtect App 3.1.5", "GlobalProtect App 3.1.4", "GlobalProtect App 3.1.3", "GlobalProtect App 3.1.1", "GlobalProtect App 3.1.0", "GlobalProtect App 3.1", "GlobalProtect App 3.0.3", "GlobalProtect App 3.0.2", "GlobalProtect App 3.0.1", "GlobalProtect App 3.0.0", "GlobalProtect App 3.0", "GlobalProtect App 2.3.5", "GlobalProtect App 2.3.4", "GlobalProtect App 2.3.3", "GlobalProtect App 2.3.2", "GlobalProtect App 2.3.1", "GlobalProtect App 2.3.0", "GlobalProtect App 2.3", "GlobalProtect App 2.2.2", "GlobalProtect App 2.2.1", "GlobalProtect App 2.2.0", "GlobalProtect App 2.2", "GlobalProtect App 2.1.4", "GlobalProtect App 2.1.3", "GlobalProtect App 2.1.2", "GlobalProtect App 2.1.1", "GlobalProtect App 2.1.0", "GlobalProtect App 2.1", "GlobalProtect App 2.0.5", "GlobalProtect App 2.0.4", "GlobalProtect App 2.0.3", "GlobalProtect App 2.0.2", "GlobalProtect App 2.0.1", "GlobalProtect App 2.0.0", "GlobalProtect App 2.0", "GlobalProtect App 1.2.11", "GlobalProtect App 1.2.10", "GlobalProtect App 1.2.9", "GlobalProtect App 1.2.8", "GlobalProtect App 1.2.7", "GlobalProtect App 1.2.6", "GlobalProtect App 1.2.5", "GlobalProtect App 1.2.4", "GlobalProtect App 1.2.3", "GlobalProtect App 1.2.2", "GlobalProtect App 1.2.1", "GlobalProtect App 1.2.0", "GlobalProtect App 1.2", "GlobalProtect App 1.1.8", "GlobalProtect App 1.1.7", "GlobalProtect App 1.1.6", "GlobalProtect App 1.1.5", "GlobalProtect App 1.1.4", "GlobalProtect App 1.1.3", "GlobalProtect App 1.1.2", "GlobalProtect App 1.1.1", "GlobalProtect App 1.1.0", "GlobalProtect App 1.1", "GlobalProtect App 1.0.8", "GlobalProtect App 1.0.7", "GlobalProtect App 1.0.5", "GlobalProtect App 1.0.3", "GlobalProtect App 1.0.1", "GlobalProtect App 1.0" ] } } }, "cveMetadata": { "assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "assignerShortName": "palo_alto", "cveId": "CVE-2021-3057", "datePublished": "2021-10-13T16:10:10.405531Z", "dateReserved": "2021-01-06T00:00:00", "dateUpdated": "2024-09-17T01:35:48.767Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-9473
Vulnerability from cvelistv5
Published
2024-10-09 17:07
Modified
2024-10-18 11:59
Severity ?
EPSS score ?
Summary
A privilege escalation vulnerability in the Palo Alto Networks GlobalProtect app on Windows allows a locally authenticated non-administrative Windows user to escalate their privileges to NT AUTHORITY/SYSTEM through the use of the repair functionality offered by the .msi file used to install GlobalProtect.
References
▼ | URL | Tags |
---|---|---|
https://security.paloaltonetworks.com/CVE-2024-9473 | vendor-advisory | |
https://sec-consult.com/vulnerability-lab/advisory/local-privilege-escalation-via-msi-installer-in-palo-alto-networks-globalprotect/ | third-party-advisory, exploit |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Palo Alto Networks | GlobalProtect App |
Version: 5.1 Version: 6.0 Version: 6.1 Version: 6.2.0 < 6.2.5 Version: 6.3 cpe:2.3:a:paloaltonetworks:globalprotect_app:6.3.1:-:*:*:*:*:*:* cpe:2.3:a:paloaltonetworks:globalprotect_app:6.3.0:-:*:*:*:*:*:* cpe:2.3:a:paloaltonetworks:globalprotect_app:6.2.4:-:*:*:*:*:*:* cpe:2.3:a:paloaltonetworks:globalprotect_app:6.2.3:-:*:*:*:*:*:* cpe:2.3:a:paloaltonetworks:globalprotect_app:6.2.2:-:*:*:*:*:*:* cpe:2.3:a:paloaltonetworks:globalprotect_app:6.2.1:-:*:*:*:*:*:* cpe:2.3:a:paloaltonetworks:globalprotect_app:6.2.0:-:*:*:*:*:*:* cpe:2.3:a:paloaltonetworks:globalprotect_app:6.2:-:*:*:*:*:*:* cpe:2.3:a:paloaltonetworks:globalprotect_app:6.1.5:-:*:*:*:*:*:* cpe:2.3:a:paloaltonetworks:globalprotect_app:6.1.4:-:*:*:*:*:*:* cpe:2.3:a:paloaltonetworks:globalprotect_app:6.1.3:-:*:*:*:*:*:* cpe:2.3:a:paloaltonetworks:globalprotect_app:6.1.2:-:*:*:*:*:*:* cpe:2.3:a:paloaltonetworks:globalprotect_app:6.1.1:-:*:*:*:*:*:* cpe:2.3:a:paloaltonetworks:globalprotect_app:6.1.0:-:*:*:*:*:*:* cpe:2.3:a:paloaltonetworks:globalprotect_app:6.1:-:*:*:*:*:*:* cpe:2.3:a:paloaltonetworks:globalprotect_app:6.0.10:-:*:*:*:*:*:* cpe:2.3:a:paloaltonetworks:globalprotect_app:6.0.8:-:*:*:*:*:*:* cpe:2.3:a:paloaltonetworks:globalprotect_app:6.0.7:-:*:*:*:*:*:* cpe:2.3:a:paloaltonetworks:globalprotect_app:6.0.6:-:*:*:*:*:*:* cpe:2.3:a:paloaltonetworks:globalprotect_app:6.0.5:-:*:*:*:*:*:* cpe:2.3:a:paloaltonetworks:globalprotect_app:6.0.4:-:*:*:*:*:*:* cpe:2.3:a:paloaltonetworks:globalprotect_app:6.0.3:-:*:*:*:*:*:* cpe:2.3:a:paloaltonetworks:globalprotect_app:6.0.2:-:*:*:*:*:*:* cpe:2.3:a:paloaltonetworks:globalprotect_app:6.0.1:-:*:*:*:*:*:* cpe:2.3:a:paloaltonetworks:globalprotect_app:6.0.0:-:*:*:*:*:*:* cpe:2.3:a:paloaltonetworks:globalprotect_app:6.0:-:*:*:*:*:*:* cpe:2.3:a:paloaltonetworks:globalprotect_app:5.1.12:-:*:*:*:*:*:* cpe:2.3:a:paloaltonetworks:globalprotect_app:5.1.11:-:*:*:*:*:*:* cpe:2.3:a:paloaltonetworks:globalprotect_app:5.1.10:-:*:*:*:*:*:* cpe:2.3:a:paloaltonetworks:globalprotect_app:5.1.9:-:*:*:*:*:*:* cpe:2.3:a:paloaltonetworks:globalprotect_app:5.1.8:-:*:*:*:*:*:* cpe:2.3:a:paloaltonetworks:globalprotect_app:5.1.7:-:*:*:*:*:*:* cpe:2.3:a:paloaltonetworks:globalprotect_app:5.1.6:-:*:*:*:*:*:* cpe:2.3:a:paloaltonetworks:globalprotect_app:5.1.5:-:*:*:*:*:*:* cpe:2.3:a:paloaltonetworks:globalprotect_app:5.1.4:-:*:*:*:*:*:* cpe:2.3:a:paloaltonetworks:globalprotect_app:5.1.3:-:*:*:*:*:*:* cpe:2.3:a:paloaltonetworks:globalprotect_app:5.1.2:-:*:*:*:*:*:* cpe:2.3:a:paloaltonetworks:globalprotect_app:5.1.1:-:*:*:*:*:*:* cpe:2.3:a:paloaltonetworks:globalprotect_app:5.1.0:-:*:*:*:*:*:* cpe:2.3:a:paloaltonetworks:globalprotect_app:5.1:-:*:*:*:*:*:* |
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:paloaltonetworks:globalprotect:5.1.0:*:*:*:*:windows:*:*" ], "defaultStatus": "unaffected", "product": "globalprotect", "vendor": "paloaltonetworks", "versions": [ { "status": "affected", "version": "5.1.0" } ] }, { "cpes": [ "cpe:2.3:a:paloaltonetworks:globalprotect:6.0.0:*:*:*:*:windows:*:*" ], "defaultStatus": "unaffected", "product": "globalprotect", "vendor": "paloaltonetworks", "versions": [ { "status": "affected", "version": "6.0.0" } ] }, { "cpes": [ "cpe:2.3:a:paloaltonetworks:globalprotect:6.1.0:*:*:*:*:windows:*:*" ], "defaultStatus": "unaffected", "product": "globalprotect", "vendor": "paloaltonetworks", "versions": [ { "status": "affected", "version": "6.1.0" } ] }, { "cpes": [ "cpe:2.3:a:paloaltonetworks:globalprotect:6.3.0:*:*:*:*:windows:*:*" ], "defaultStatus": "unaffected", "product": "globalprotect", "vendor": "paloaltonetworks", "versions": [ { "status": "affected", "version": "6.3.0" } ] }, { "cpes": [ "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:windows:*:*" ], "defaultStatus": "unaffected", "product": "globalprotect", "vendor": "paloaltonetworks", "versions": [ { "lessThan": "6.2.5", "status": "affected", "version": "6.2.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-9473", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-15T12:53:19.159087Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-15T13:00:52.468Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-10-10T06:03:45.155Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Oct/2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "cpes": [ "cpe:2.3:a:paloaltonetworks:globalprotect_app:6.3.1:-:*:*:*:*:*:*", "cpe:2.3:a:paloaltonetworks:globalprotect_app:6.3.0:-:*:*:*:*:*:*", "cpe:2.3:a:paloaltonetworks:globalprotect_app:6.2.4:-:*:*:*:*:*:*", "cpe:2.3:a:paloaltonetworks:globalprotect_app:6.2.3:-:*:*:*:*:*:*", "cpe:2.3:a:paloaltonetworks:globalprotect_app:6.2.2:-:*:*:*:*:*:*", "cpe:2.3:a:paloaltonetworks:globalprotect_app:6.2.1:-:*:*:*:*:*:*", "cpe:2.3:a:paloaltonetworks:globalprotect_app:6.2.0:-:*:*:*:*:*:*", "cpe:2.3:a:paloaltonetworks:globalprotect_app:6.2:-:*:*:*:*:*:*", "cpe:2.3:a:paloaltonetworks:globalprotect_app:6.1.5:-:*:*:*:*:*:*", "cpe:2.3:a:paloaltonetworks:globalprotect_app:6.1.4:-:*:*:*:*:*:*", "cpe:2.3:a:paloaltonetworks:globalprotect_app:6.1.3:-:*:*:*:*:*:*", "cpe:2.3:a:paloaltonetworks:globalprotect_app:6.1.2:-:*:*:*:*:*:*", "cpe:2.3:a:paloaltonetworks:globalprotect_app:6.1.1:-:*:*:*:*:*:*", "cpe:2.3:a:paloaltonetworks:globalprotect_app:6.1.0:-:*:*:*:*:*:*", "cpe:2.3:a:paloaltonetworks:globalprotect_app:6.1:-:*:*:*:*:*:*", "cpe:2.3:a:paloaltonetworks:globalprotect_app:6.0.10:-:*:*:*:*:*:*", "cpe:2.3:a:paloaltonetworks:globalprotect_app:6.0.8:-:*:*:*:*:*:*", "cpe:2.3:a:paloaltonetworks:globalprotect_app:6.0.7:-:*:*:*:*:*:*", "cpe:2.3:a:paloaltonetworks:globalprotect_app:6.0.6:-:*:*:*:*:*:*", "cpe:2.3:a:paloaltonetworks:globalprotect_app:6.0.5:-:*:*:*:*:*:*", "cpe:2.3:a:paloaltonetworks:globalprotect_app:6.0.4:-:*:*:*:*:*:*", "cpe:2.3:a:paloaltonetworks:globalprotect_app:6.0.3:-:*:*:*:*:*:*", "cpe:2.3:a:paloaltonetworks:globalprotect_app:6.0.2:-:*:*:*:*:*:*", "cpe:2.3:a:paloaltonetworks:globalprotect_app:6.0.1:-:*:*:*:*:*:*", "cpe:2.3:a:paloaltonetworks:globalprotect_app:6.0.0:-:*:*:*:*:*:*", "cpe:2.3:a:paloaltonetworks:globalprotect_app:6.0:-:*:*:*:*:*:*", "cpe:2.3:a:paloaltonetworks:globalprotect_app:5.1.12:-:*:*:*:*:*:*", "cpe:2.3:a:paloaltonetworks:globalprotect_app:5.1.11:-:*:*:*:*:*:*", "cpe:2.3:a:paloaltonetworks:globalprotect_app:5.1.10:-:*:*:*:*:*:*", "cpe:2.3:a:paloaltonetworks:globalprotect_app:5.1.9:-:*:*:*:*:*:*", "cpe:2.3:a:paloaltonetworks:globalprotect_app:5.1.8:-:*:*:*:*:*:*", "cpe:2.3:a:paloaltonetworks:globalprotect_app:5.1.7:-:*:*:*:*:*:*", "cpe:2.3:a:paloaltonetworks:globalprotect_app:5.1.6:-:*:*:*:*:*:*", "cpe:2.3:a:paloaltonetworks:globalprotect_app:5.1.5:-:*:*:*:*:*:*", "cpe:2.3:a:paloaltonetworks:globalprotect_app:5.1.4:-:*:*:*:*:*:*", "cpe:2.3:a:paloaltonetworks:globalprotect_app:5.1.3:-:*:*:*:*:*:*", "cpe:2.3:a:paloaltonetworks:globalprotect_app:5.1.2:-:*:*:*:*:*:*", "cpe:2.3:a:paloaltonetworks:globalprotect_app:5.1.1:-:*:*:*:*:*:*", "cpe:2.3:a:paloaltonetworks:globalprotect_app:5.1.0:-:*:*:*:*:*:*", "cpe:2.3:a:paloaltonetworks:globalprotect_app:5.1:-:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "GlobalProtect App", "vendor": "Palo Alto Networks", "versions": [ { "status": "affected", "version": "5.1" }, { "status": "affected", "version": "6.0" }, { "status": "affected", "version": "6.1" }, { "changes": [ { "at": "6.2.5", "status": "unaffected" } ], "lessThan": "6.2.5", "status": "affected", "version": "6.2.0", "versionType": "custom" }, { "status": "affected", "version": "6.3" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Michael Baer of SEC Consult Vulnerability Lab" }, { "lang": "en", "type": "finder", "value": "Marc Barrantes of KPMG Spain" } ], "datePublic": "2024-10-09T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A privilege escalation vulnerability in the Palo Alto Networks GlobalProtect app on Windows allows a locally authenticated non-administrative Windows user to escalate their privileges to NT AUTHORITY/SYSTEM through the use of the repair functionality offered by the .msi file used to install GlobalProtect." } ], "value": "A privilege escalation vulnerability in the Palo Alto Networks GlobalProtect app on Windows allows a locally authenticated non-administrative Windows user to escalate their privileges to NT AUTHORITY/SYSTEM through the use of the repair functionality offered by the .msi file used to install GlobalProtect." } ], "exploits": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue. However, a proof of concept for this issue is publicly available.\u003cbr\u003e" } ], "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue. However, a proof of concept for this issue is publicly available." } ], "impacts": [ { "capecId": "CAPEC-233", "descriptions": [ { "lang": "en", "value": "CAPEC-233 Privilege Escalation" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NO", "Recovery": "USER", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "PRESENT", "attackVector": "LOCAL", "baseScore": 5.2, "baseSeverity": "MEDIUM", "privilegesRequired": "LOW", "providerUrgency": "AMBER", "subAvailabilityImpact": "HIGH", "subConfidentialityImpact": "HIGH", "subIntegrityImpact": "HIGH", "userInteraction": "NONE", "valueDensity": "CONCENTRATED", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:H/SI:H/SA:H/AU:N/R:U/V:C/RE:M/U:Amber", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "MODERATE" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-250", "description": "CWE-250 Execution with Unnecessary Privileges", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-18T11:59:17.267Z", "orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "shortName": "palo_alto" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2024-9473" }, { "tags": [ "third-party-advisory", "exploit" ], "url": "https://sec-consult.com/vulnerability-lab/advisory/local-privilege-escalation-via-msi-installer-in-palo-alto-networks-globalprotect/" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "This issue is fixed in GlobalProtect app 6.2.5, and will be fixed in the remaining supported versions of GlobalProtect app listed in the Product Status section. Updates will be published to this advisory as they become available.\u003cbr\u003e\u003cbr\u003eCustomers who want to upgrade should reach out to customer support at \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://support.paloaltonetworks.com\"\u003ehttps://support.paloaltonetworks.com\u003c/a\u003e.\u003cbr\u003e" } ], "value": "This issue is fixed in GlobalProtect app 6.2.5, and will be fixed in the remaining supported versions of GlobalProtect app listed in the Product Status section. Updates will be published to this advisory as they become available.\n\nCustomers who want to upgrade should reach out to customer support at https://support.paloaltonetworks.com ." } ], "source": { "defect": [ "GPC-19493", "GPC-21211" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2024-10-09T16:00:00.000Z", "value": "Initial publication" } ], "title": "GlobalProtect App: Local Privilege Escalation (PE) Vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "assignerShortName": "palo_alto", "cveId": "CVE-2024-9473", "datePublished": "2024-10-09T17:07:00.981Z", "dateReserved": "2024-10-03T11:35:19.552Z", "dateUpdated": "2024-10-18T11:59:17.267Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-5915
Vulnerability from cvelistv5
Published
2024-08-14 16:40
Modified
2024-08-20 13:20
Severity ?
EPSS score ?
Summary
A privilege escalation (PE) vulnerability in the Palo Alto Networks GlobalProtect app on Windows devices enables a local user to execute programs with elevated privileges.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Palo Alto Networks | GlobalProtect App |
Version: 5.1 Version: 6.0 Version: 6.1 < 6.1.5 Version: 6.2 < 6.2.4 Version: 6.3 < 6.3.1 |
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "globalprotect", "vendor": "paloaltonetworks", "versions": [ { "status": "affected", "version": "5.1" }, { "status": "affected", "version": "6.0" }, { "lessThan": "6.1.5", "status": "affected", "version": "6.1", "versionType": "custom" }, { "lessThan": "6.2.4", "status": "affected", "version": "6.2", "versionType": "custom" }, { "lessThan": "6.3.1", "status": "affected", "version": "6.3", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-5915", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-08-17T03:55:16.725264Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-20T13:20:36.459Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "GlobalProtect App", "vendor": "Palo Alto Networks", "versions": [ { "status": "affected", "version": "5.1" }, { "status": "affected", "version": "6.0" }, { "changes": [ { "at": "6.1.5", "status": "unaffected" } ], "lessThan": "6.1.5", "status": "affected", "version": "6.1", "versionType": "custom" }, { "changes": [ { "at": "6.2.4", "status": "unaffected" } ], "lessThan": "6.2.4", "status": "affected", "version": "6.2", "versionType": "custom" }, { "changes": [ { "at": "6.3.1", "status": "unaffected" } ], "lessThan": "6.3.1", "status": "affected", "version": "6.3", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Ashutosh Gautam/JumpThere" }, { "lang": "en", "type": "finder", "value": "Maciej Miszczyk of Logitech" }, { "lang": "en", "type": "finder", "value": "Will Dormann of ANALYGENCE" }, { "lang": "en", "type": "finder", "value": "Farid Zerrouk" }, { "lang": "en", "type": "finder", "value": "Alaa Kachouh" }, { "lang": "en", "type": "finder", "value": "Ali Jammal" } ], "datePublic": "2024-08-14T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A privilege escalation (PE) vulnerability in the Palo Alto Networks GlobalProtect app on Windows devices enables a local user to execute programs with elevated privileges." } ], "value": "A privilege escalation (PE) vulnerability in the Palo Alto Networks GlobalProtect app on Windows devices enables a local user to execute programs with elevated privileges." } ], "exploits": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue.\u003cbr\u003e" } ], "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue." } ], "impacts": [ { "capecId": "CAPEC-233", "descriptions": [ { "lang": "en", "value": "CAPEC-233 Privilege Escalation" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NO", "Recovery": "AUTOMATIC", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "PRESENT", "attackVector": "LOCAL", "baseScore": 5.2, "baseSeverity": "MEDIUM", "privilegesRequired": "LOW", "providerUrgency": "AMBER", "subAvailabilityImpact": "HIGH", "subConfidentialityImpact": "HIGH", "subIntegrityImpact": "HIGH", "userInteraction": "NONE", "valueDensity": "DIFFUSE", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:H/SI:H/SA:H/AU:N/R:A/V:D/RE:M/U:Amber", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "MODERATE" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-732", "description": "CWE-732 Incorrect Permission Assignment for Critical Resource", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-14T16:40:41.840Z", "orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "shortName": "palo_alto" }, "references": [ { "url": "https://security.paloaltonetworks.com/CVE-2024-5915" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "This issue is fixed in GlobalProtect app 5.1.x (ETA: December 2024), GlobalProtect app 6.0.x (ETA: November 2024), GlobalProtect app 6.1.5, GlobalProtect app 6.2.4, GlobalProtect app 6.3.1 (ETA: end of August), and all later GlobalProtect app versions on Windows.\u003cbr\u003e" } ], "value": "This issue is fixed in GlobalProtect app 5.1.x (ETA: December 2024), GlobalProtect app 6.0.x (ETA: November 2024), GlobalProtect app 6.1.5, GlobalProtect app 6.2.4, GlobalProtect app 6.3.1 (ETA: end of August), and all later GlobalProtect app versions on Windows." } ], "source": { "defect": [ "GPC-14958", "GPC-19883" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2024-08-14T16:00:00.000Z", "value": "Initial publication" } ], "title": "GlobalProtect App: Local Privilege Escalation (PE) Vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "assignerShortName": "palo_alto", "cveId": "CVE-2024-5915", "datePublished": "2024-08-14T16:40:41.840Z", "dateReserved": "2024-06-12T15:27:56.748Z", "dateUpdated": "2024-08-20T13:20:36.459Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-0016
Vulnerability from cvelistv5
Published
2022-02-10 18:10
Modified
2024-09-17 02:00
Severity ?
EPSS score ?
Summary
An improper handling of exceptional conditions vulnerability exists within the Connect Before Logon feature of the Palo Alto Networks GlobalProtect app that enables a local attacker to escalate to SYSTEM or root privileges when authenticating with Connect Before Logon under certain circumstances. This issue impacts GlobalProtect app 5.2 versions earlier than GlobalProtect app 5.2.9 on Windows and MacOS. This issue does not affect the GlobalProtect app on other platforms.
References
▼ | URL | Tags |
---|---|---|
https://security.paloaltonetworks.com/CVE-2022-0016 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | Palo Alto Networks | GlobalProtect App |
Version: 5.2 < 5.2.9 |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:18:41.378Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security.paloaltonetworks.com/CVE-2022-0016" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Windows and MacOS" ], "product": "GlobalProtect App", "vendor": "Palo Alto Networks", "versions": [ { "changes": [ { "at": "5.2.9", "status": "unaffected" } ], "lessThan": "5.2.9", "status": "affected", "version": "5.2", "versionType": "custom" } ] }, { "product": "GlobalProtect App", "vendor": "Palo Alto Networks", "versions": [ { "status": "unaffected", "version": "5.3.*" }, { "lessThan": "5.1*", "status": "unaffected", "version": "5.1.*", "versionType": "custom" } ] } ], "configurations": [ { "lang": "en", "value": "This issue is applicable only to devices configured to use the GlobalProtect Connect Before Logon feature." } ], "credits": [ { "lang": "en", "value": "Palo Alto Networks thanks Adam Crosser (Praetorian), Brian Sizemore (Praetorian) and N. Sao (Genetec) for independently discovering and reporting this issue." } ], "datePublic": "2022-02-09T00:00:00", "descriptions": [ { "lang": "en", "value": "An improper handling of exceptional conditions vulnerability exists within the Connect Before Logon feature of the Palo Alto Networks GlobalProtect app that enables a local attacker to escalate to SYSTEM or root privileges when authenticating with Connect Before Logon under certain circumstances. This issue impacts GlobalProtect app 5.2 versions earlier than GlobalProtect app 5.2.9 on Windows and MacOS. This issue does not affect the GlobalProtect app on other platforms." } ], "exploits": [ { "lang": "en", "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-703", "description": "CWE-703 Improper Check or Handling of Exceptional Conditions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-10T18:10:16", "orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "shortName": "palo_alto" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security.paloaltonetworks.com/CVE-2022-0016" } ], "solutions": [ { "lang": "en", "value": "This issue is fixed in GlobalProtect app 5.2.9 on Windows and MacOS, and all later GlobalProtect app versions." } ], "source": { "defect": [ "GPC-14404", "GPC-13685", "GPC-14747" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2022-02-09T00:00:00", "value": "Initial publication" } ], "title": "GlobalProtect App: Privilege Escalation Vulnerability When Using Connect Before Logon", "workarounds": [ { "lang": "en", "value": "There are no known workarounds for this issue." } ], "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@paloaltonetworks.com", "DATE_PUBLIC": "2022-02-09T17:00:00.000Z", "ID": "CVE-2022-0016", "STATE": "PUBLIC", "TITLE": "GlobalProtect App: Privilege Escalation Vulnerability When Using Connect Before Logon" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "GlobalProtect App", "version": { "version_data": [ { "platform": "Windows and MacOS", "version_affected": "\u003c", "version_name": "5.2", "version_value": "5.2.9" }, { "platform": "Windows and MacOS", "version_affected": "!\u003e=", "version_name": "5.2", "version_value": "5.2.9" }, { "version_affected": "!\u003e=", "version_name": "5.1", "version_value": "5.1.*" }, { "version_affected": "!", "version_name": "5.3", "version_value": "5.3.*" } ] } } ] }, "vendor_name": "Palo Alto Networks" } ] } }, "configuration": [ { "lang": "en", "value": "This issue is applicable only to devices configured to use the GlobalProtect Connect Before Logon feature." } ], "credit": [ { "lang": "eng", "value": "Palo Alto Networks thanks Adam Crosser (Praetorian), Brian Sizemore (Praetorian) and N. Sao (Genetec) for independently discovering and reporting this issue." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An improper handling of exceptional conditions vulnerability exists within the Connect Before Logon feature of the Palo Alto Networks GlobalProtect app that enables a local attacker to escalate to SYSTEM or root privileges when authenticating with Connect Before Logon under certain circumstances. This issue impacts GlobalProtect app 5.2 versions earlier than GlobalProtect app 5.2.9 on Windows and MacOS. This issue does not affect the GlobalProtect app on other platforms." } ] }, "exploit": [ { "lang": "en", "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue." } ], "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-703 Improper Check or Handling of Exceptional Conditions" } ] } ] }, "references": { "reference_data": [ { "name": "https://security.paloaltonetworks.com/CVE-2022-0016", "refsource": "MISC", "url": "https://security.paloaltonetworks.com/CVE-2022-0016" } ] }, "solution": [ { "lang": "en", "value": "This issue is fixed in GlobalProtect app 5.2.9 on Windows and MacOS, and all later GlobalProtect app versions." } ], "source": { "defect": [ "GPC-14404", "GPC-13685", "GPC-14747" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2022-02-09T00:00:00", "value": "Initial publication" } ], "work_around": [ { "lang": "en", "value": "There are no known workarounds for this issue." } ], "x_advisoryEoL": true, "x_affectedList": [ "GlobalProtect App 5.2.8", "GlobalProtect App 5.2.7", "GlobalProtect App 5.2.6", "GlobalProtect App 5.2.5", "GlobalProtect App 5.2.4", "GlobalProtect App 5.2.3", "GlobalProtect App 5.2.2", "GlobalProtect App 5.2.1", "GlobalProtect App 5.2.0", "GlobalProtect App 5.2" ], "x_likelyAffectedList": [ "GlobalProtect App 5.0.10", "GlobalProtect App 5.0.9", "GlobalProtect App 5.0.8", "GlobalProtect App 5.0.7", "GlobalProtect App 5.0.6", "GlobalProtect App 5.0.5", "GlobalProtect App 5.0.4", "GlobalProtect App 5.0.3", "GlobalProtect App 5.0.2", "GlobalProtect App 5.0.1", "GlobalProtect App 5.0.0", "GlobalProtect App 5.0", "GlobalProtect App 4.1.13", "GlobalProtect App 4.1.12", "GlobalProtect App 4.1.11", "GlobalProtect App 4.1.10", "GlobalProtect App 4.1.9", "GlobalProtect App 4.1.8", "GlobalProtect App 4.1.7", "GlobalProtect App 4.1.6", "GlobalProtect App 4.1.5", "GlobalProtect App 4.1.4", "GlobalProtect App 4.1.3", "GlobalProtect App 4.1.2", "GlobalProtect App 4.1.1", "GlobalProtect App 4.1.0", "GlobalProtect App 4.1", "GlobalProtect App 4.0.8", "GlobalProtect App 4.0.7", "GlobalProtect App 4.0.6", "GlobalProtect App 4.0.5", "GlobalProtect App 4.0.4", "GlobalProtect App 4.0.3", "GlobalProtect App 4.0.2", "GlobalProtect App 4.0.0", "GlobalProtect App 4.0", "GlobalProtect App 3.1.6", "GlobalProtect App 3.1.5", "GlobalProtect App 3.1.4", "GlobalProtect App 3.1.3", "GlobalProtect App 3.1.1", "GlobalProtect App 3.1.0", "GlobalProtect App 3.1", "GlobalProtect App 3.0.3", "GlobalProtect App 3.0.2", "GlobalProtect App 3.0.1", "GlobalProtect App 3.0.0", "GlobalProtect App 3.0", "GlobalProtect App 2.3.5", "GlobalProtect App 2.3.4", "GlobalProtect App 2.3.3", "GlobalProtect App 2.3.2", "GlobalProtect App 2.3.1", "GlobalProtect App 2.3.0", "GlobalProtect App 2.3", "GlobalProtect App 2.2.2", "GlobalProtect App 2.2.1", "GlobalProtect App 2.2.0", "GlobalProtect App 2.2", "GlobalProtect App 2.1.4", "GlobalProtect App 2.1.3", "GlobalProtect App 2.1.2", "GlobalProtect App 2.1.1", "GlobalProtect App 2.1.0", "GlobalProtect App 2.1", "GlobalProtect App 2.0.5", "GlobalProtect App 2.0.4", "GlobalProtect App 2.0.3", "GlobalProtect App 2.0.2", "GlobalProtect App 2.0.1", "GlobalProtect App 2.0.0", "GlobalProtect App 2.0", "GlobalProtect App 1.2.11", "GlobalProtect App 1.2.10", "GlobalProtect App 1.2.9", "GlobalProtect App 1.2.8", "GlobalProtect App 1.2.7", "GlobalProtect App 1.2.6", "GlobalProtect App 1.2.5", "GlobalProtect App 1.2.4", "GlobalProtect App 1.2.3", "GlobalProtect App 1.2.2", "GlobalProtect App 1.2.1", "GlobalProtect App 1.2.0", "GlobalProtect App 1.2", "GlobalProtect App 1.1.8", "GlobalProtect App 1.1.7", "GlobalProtect App 1.1.6", "GlobalProtect App 1.1.5", "GlobalProtect App 1.1.4", "GlobalProtect App 1.1.3", "GlobalProtect App 1.1.2", "GlobalProtect App 1.1.1", "GlobalProtect App 1.1.0", "GlobalProtect App 1.1", "GlobalProtect App 1.0.8", "GlobalProtect App 1.0.7", "GlobalProtect App 1.0.5", "GlobalProtect App 1.0.3", "GlobalProtect App 1.0.1", "GlobalProtect App 1.0" ] } } }, "cveMetadata": { "assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "assignerShortName": "palo_alto", "cveId": "CVE-2022-0016", "datePublished": "2022-02-10T18:10:16.879284Z", "dateReserved": "2021-12-28T00:00:00", "dateUpdated": "2024-09-17T02:00:45.459Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-8687
Vulnerability from cvelistv5
Published
2024-09-11 16:40
Modified
2024-09-11 18:25
Severity ?
EPSS score ?
Summary
An information exposure vulnerability exists in Palo Alto Networks PAN-OS software that enables a GlobalProtect end user to learn both the configured GlobalProtect uninstall password and the configured disable or disconnect passcode. After the password or passcode is known, end users can uninstall, disable, or disconnect GlobalProtect even if the GlobalProtect app configuration would not normally permit them to do so.
References
Impacted products
Vendor | Product | Version | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Palo Alto Networks | PAN-OS |
Version: 11.0.0 < 11.0.1 Version: 10.2.0 < 10.2.4 Version: 10.1.0 < 10.1.9 Version: 10.0.0 < 10.0.12 Version: 9.1.0 < 9.1.16 Version: 9.0.0 < 9.0.17 Version: 8.1.0 < 8.1.25 |
||||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-8687", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-11T18:23:36.439085Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T18:25:14.604Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "PAN-OS", "vendor": "Palo Alto Networks", "versions": [ { "status": "unaffected", "version": "11.1.0" }, { "status": "unaffected", "version": "11.2.0" }, { "changes": [ { "at": "11.0.1", "status": "unaffected" } ], "lessThan": "11.0.1", "status": "affected", "version": "11.0.0", "versionType": "custom" }, { "changes": [ { "at": "10.2.4", "status": "unaffected" } ], "lessThan": "10.2.4", "status": "affected", "version": "10.2.0", "versionType": "custom" }, { "changes": [ { "at": "10.1.9", "status": "unaffected" } ], "lessThan": "10.1.9", "status": "affected", "version": "10.1.0", "versionType": "custom" }, { "changes": [ { "at": "10.0.12", "status": "unaffected" } ], "lessThan": "10.0.12", "status": "affected", "version": "10.0.0", "versionType": "custom" }, { "changes": [ { "at": "9.1.16", "status": "unaffected" } ], "lessThan": "9.1.16", "status": "affected", "version": "9.1.0", "versionType": "custom" }, { "changes": [ { "at": "9.0.17", "status": "unaffected" } ], "lessThan": "9.0.17", "status": "affected", "version": "9.0.0", "versionType": "custom" }, { "changes": [ { "at": "8.1.25", "status": "unaffected" } ], "lessThan": "8.1.25", "status": "affected", "version": "8.1.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "GlobalProtect App", "vendor": "Palo Alto Networks", "versions": [ { "changes": [ { "at": "5.1.12", "status": "unaffected" } ], "lessThan": "5.1.12", "status": "affected", "version": "5.1.0", "versionType": "custom" }, { "changes": [ { "at": "5.2.13", "status": "unaffected" } ], "lessThan": "5.2.13", "status": "affected", "version": "5.2.0", "versionType": "custom" }, { "changes": [ { "at": "6.0.7", "status": "unaffected" } ], "lessThan": "6.0.7", "status": "affected", "version": "6.0.0", "versionType": "custom" }, { "changes": [ { "at": "6.1.2", "status": "unaffected" } ], "lessThan": "6.1.2", "status": "affected", "version": "6.1.0", "versionType": "custom" }, { "changes": [ { "at": "6.2.1", "status": "unaffected" } ], "lessThan": "6.2.1", "status": "affected", "version": "6.2.0", "versionType": "custom" }, { "status": "unaffected", "version": "6.3.0" } ] }, { "defaultStatus": "unaffected", "product": "Cloud NGFW", "vendor": "Palo Alto Networks", "versions": [ { "status": "unaffected", "version": "All" } ] }, { "defaultStatus": "unaffected", "product": "Prisma Access", "vendor": "Palo Alto Networks", "versions": [ { "changes": [ { "at": "10.2.9 on PAN-OS", "status": "unaffected" } ], "lessThan": "10.2.9 on PAN-OS", "status": "affected", "version": "10.2.0", "versionType": "custom" } ] } ], "configurations": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Impacted systems are those on which any of the following features are enabled:\u003cbr\u003e* Network \u0026gt; GlobalProtect \u0026gt; Portals \u0026gt; \u0026gt; Agent \u0026gt; \u0026gt; App \u0026gt; Allow User to Disable GlobalProtect App \u0026gt; Allow with Passcode\u003cbr\u003e* Network \u0026gt; GlobalProtect \u0026gt; Portals \u0026gt; \u0026gt; Agent \u0026gt; \u0026gt; App \u0026gt; Allow user to disconnect GlobalProtect App \u0026gt; Allow with Passcode\u003cbr\u003e* Network \u0026gt; GlobalProtect \u0026gt; Portals \u0026gt; \u0026gt; Agent \u0026gt; \u0026gt; App \u0026gt; Allow User to Uninstall GlobalProtect App \u0026gt; Allow with Password" } ], "value": "Impacted systems are those on which any of the following features are enabled:\n* Network \u003e GlobalProtect \u003e Portals \u003e \u003e Agent \u003e \u003e App \u003e Allow User to Disable GlobalProtect App \u003e Allow with Passcode\n* Network \u003e GlobalProtect \u003e Portals \u003e \u003e Agent \u003e \u003e App \u003e Allow user to disconnect GlobalProtect App \u003e Allow with Passcode\n* Network \u003e GlobalProtect \u003e Portals \u003e \u003e Agent \u003e \u003e App \u003e Allow User to Uninstall GlobalProtect App \u003e Allow with Password" } ], "credits": [ { "lang": "en", "type": "finder", "value": "Claudiu Pancotan" } ], "datePublic": "2024-09-11T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "An information exposure vulnerability exists in Palo Alto Networks PAN-OS software that enables a GlobalProtect end user to learn both the configured GlobalProtect uninstall password and the configured disable or disconnect passcode. After the password or passcode is known, end users can uninstall, disable, or disconnect GlobalProtect even if the GlobalProtect app configuration would not normally permit them to do so." } ], "value": "An information exposure vulnerability exists in Palo Alto Networks PAN-OS software that enables a GlobalProtect end user to learn both the configured GlobalProtect uninstall password and the configured disable or disconnect passcode. After the password or passcode is known, end users can uninstall, disable, or disconnect GlobalProtect even if the GlobalProtect app configuration would not normally permit them to do so." } ], "exploits": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue.\u003cbr\u003e" } ], "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue." } ], "impacts": [ { "capecId": "CAPEC-383", "descriptions": [ { "lang": "en", "value": "CAPEC-383 Harvesting Information via API Event Monitoring" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NO", "Recovery": "AUTOMATIC", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "LOCAL", "baseScore": 6.9, "baseSeverity": "MEDIUM", "privilegesRequired": "LOW", "providerUrgency": "AMBER", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "DIFFUSE", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:L/SC:N/SI:N/SA:N/AU:N/R:A/V:D/RE:M/U:Amber", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "NONE", "vulnerabilityResponseEffort": "MODERATE" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-497", "description": "CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-11T16:40:21.066Z", "orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "shortName": "palo_alto" }, "references": [ { "url": "https://security.paloaltonetworks.com/CVE-2024-8687" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "This issue is fixed in PAN-OS 8.1.25, PAN-OS 9.0.17, PAN-OS 9.1.16, PAN-OS 10.0.12, PAN-OS 10.1.9, PAN-OS 10.2.4, PAN-OS 11.0.1, and all later PAN-OS versions. It is also fixed in Prisma Access 10.2.9 and all later Prisma Access versions. To maintain GlobalProtect app functionality for the vulnerable features, we released a corresponding software update for GlobalProtect app 5.1.12, GlobalProtect app 5.2.13, GlobalProtect app 6.0.7, GlobalProtect app 6.1.2, and GlobalProtect app 6.2.1, and all later GlobalProtect app versions.\u003cbr\u003e\u003cbr\u003eTo maintain the ability for end users to use the uninstall password feature and the disable or disconnect passcode feature, you must ensure that you upgrade all GlobalProtect app deployments to a fixed version before you upgrade your PAN-OS software to a fixed version.\u003cbr\u003e\u003cbr\u003eAll fixed versions of GlobalProtect are backwards compatible with vulnerable versions of PAN-OS software. However, fixed versions of PAN-OS software are not backwards compatible with vulnerable versions of GlobalProtect.\u003cbr\u003e\u003cbr\u003eYou can find additional information for PAN-204689 here: \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://docs.paloaltonetworks.com/pan-os/11-1/pan-os-release-notes/pan-os-11-1-0-known-and-addressed-issues/pan-os-11-1-0-known-issues\"\u003ehttps://docs.paloaltonetworks.com/pan-os/11-1/pan-os-release-notes/pan-os-11-1-0-known-and-addressed-issues/pan-os-11-1-0-known-issues\u003c/a\u003e\n\nPrisma Access customers can open a support case to request an upgrade.\u003cbr\u003e" } ], "value": "This issue is fixed in PAN-OS 8.1.25, PAN-OS 9.0.17, PAN-OS 9.1.16, PAN-OS 10.0.12, PAN-OS 10.1.9, PAN-OS 10.2.4, PAN-OS 11.0.1, and all later PAN-OS versions. It is also fixed in Prisma Access 10.2.9 and all later Prisma Access versions. To maintain GlobalProtect app functionality for the vulnerable features, we released a corresponding software update for GlobalProtect app 5.1.12, GlobalProtect app 5.2.13, GlobalProtect app 6.0.7, GlobalProtect app 6.1.2, and GlobalProtect app 6.2.1, and all later GlobalProtect app versions.\n\nTo maintain the ability for end users to use the uninstall password feature and the disable or disconnect passcode feature, you must ensure that you upgrade all GlobalProtect app deployments to a fixed version before you upgrade your PAN-OS software to a fixed version.\n\nAll fixed versions of GlobalProtect are backwards compatible with vulnerable versions of PAN-OS software. However, fixed versions of PAN-OS software are not backwards compatible with vulnerable versions of GlobalProtect.\n\nYou can find additional information for PAN-204689 here: https://docs.paloaltonetworks.com/pan-os/11-1/pan-os-release-notes/pan-os-11-1-0-known-and-addressed-issues/pan-os-11-1-0-known-issues \n\nPrisma Access customers can open a support case to request an upgrade." } ], "source": { "defect": [ "PAN-204689", "GPC-16848" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2024-09-11T16:00:00.000Z", "value": "Initial publication" } ], "title": "PAN-OS: Cleartext Exposure of GlobalProtect Portal Passcodes", "workarounds": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Change the following two settings (if enabled) to \"Allow with Ticket\":\u003cbr\u003e* Network \u0026gt; GlobalProtect \u0026gt; Portals \u0026gt; \u0026gt; Agent \u0026gt; \u0026gt; App \u0026gt; Allow User to Disable GlobalProtect App\u003cbr\u003e* Network \u0026gt; GlobalProtect \u0026gt; Portals \u0026gt; \u0026gt; Agent \u0026gt; \u0026gt; App \u0026gt; Allow user to disconnect GlobalProtect App\u003cbr\u003e\u003cbr\u003eChange the following setting (if enabled) to \"Disallow\":\u003cbr\u003e* Network \u0026gt; GlobalProtect \u0026gt; Portals \u0026gt; \u0026gt; Agent \u0026gt; \u0026gt; App \u0026gt; Allow User to Uninstall GlobalProtect App\u003cbr\u003e" } ], "value": "Change the following two settings (if enabled) to \"Allow with Ticket\":\n* Network \u003e GlobalProtect \u003e Portals \u003e \u003e Agent \u003e \u003e App \u003e Allow User to Disable GlobalProtect App\n* Network \u003e GlobalProtect \u003e Portals \u003e \u003e Agent \u003e \u003e App \u003e Allow user to disconnect GlobalProtect App\n\nChange the following setting (if enabled) to \"Disallow\":\n* Network \u003e GlobalProtect \u003e Portals \u003e \u003e Agent \u003e \u003e App \u003e Allow User to Uninstall GlobalProtect App" } ], "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "assignerShortName": "palo_alto", "cveId": "CVE-2024-8687", "datePublished": "2024-09-11T16:40:21.066Z", "dateReserved": "2024-09-11T08:21:12.686Z", "dateUpdated": "2024-09-11T18:25:14.604Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-1988
Vulnerability from cvelistv5
Published
2020-04-08 18:41
Modified
2024-09-16 18:03
Severity ?
EPSS score ?
Summary
An unquoted search path vulnerability in the Windows release of Global Protect Agent allows an authenticated local user with file creation privileges on the root of the OS disk (C:\) or to Program Files directory to gain system privileges. This issue affects Palo Alto Networks GlobalProtect Agent 5.0 versions before 5.0.5; 4.1 versions before 4.1.13 on Windows;
References
▼ | URL | Tags |
---|---|---|
https://security.paloaltonetworks.com/CVE-2020-1988 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Palo Alto Networks | Global Protect Agent |
Version: 5.0 < 5.0.5 Version: 4.1 < 4.1.13 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:54:00.605Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security.paloaltonetworks.com/CVE-2020-1988" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Windows" ], "product": "Global Protect Agent", "vendor": "Palo Alto Networks", "versions": [ { "changes": [ { "at": "5.0.5", "status": "unaffected" } ], "lessThan": "5.0.5", "status": "affected", "version": "5.0", "versionType": "custom" }, { "changes": [ { "at": "4.1.13", "status": "unaffected" } ], "lessThan": "4.1.13", "status": "affected", "version": "4.1", "versionType": "custom" } ] } ], "configurations": [ { "lang": "en", "value": "This issue only affects Windows systems where local users are configured with file creation privileges to the root of the OS disk (C:\\) or \u0027Program Files\u0027 directory." } ], "credits": [ { "lang": "en", "value": "Palo Alto Networks thanks Ratnesh Pandey of Bromium and Matthew Batten for discovering and reporting this issue." } ], "datePublic": "2020-04-08T00:00:00", "descriptions": [ { "lang": "en", "value": "An unquoted search path vulnerability in the Windows release of Global Protect Agent allows an authenticated local user with file creation privileges on the root of the OS disk (C:\\) or to Program Files directory to gain system privileges. This issue affects Palo Alto Networks GlobalProtect Agent 5.0 versions before 5.0.5; 4.1 versions before 4.1.13 on Windows;" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-428", "description": "CWE-428 Unquoted Search Path or Element", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-04-08T18:41:58", "orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "shortName": "palo_alto" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security.paloaltonetworks.com/CVE-2020-1988" } ], "solutions": [ { "lang": "en", "value": "This issue is fixed in Global Protect Agent 5.0.5, Global Protect Agent 4.1.13 and all later versions." } ], "source": { "defect": [ "GPC-9320" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2020-04-08T00:00:00", "value": "Initial publication" } ], "title": "Global Protect Agent: Local privilege escalation due to an unquoted search path vulnerability", "workarounds": [ { "lang": "en", "value": "Do not grant file creation privileges on the root of the OS disk (C:\\) or \u0027Program Files\u0027 directory to unprivileged users." } ], "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@paloaltonetworks.com", "DATE_PUBLIC": "2020-04-08T16:00:00.000Z", "ID": "CVE-2020-1988", "STATE": "PUBLIC", "TITLE": "Global Protect Agent: Local privilege escalation due to an unquoted search path vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Global Protect Agent", "version": { "version_data": [ { "platform": "Windows", "version_affected": "\u003c", "version_name": "5.0", "version_value": "5.0.5" }, { "platform": "Windows", "version_affected": "\u003c", "version_name": "4.1", "version_value": "4.1.13" }, { "platform": "Windows", "version_affected": "!\u003e=", "version_name": "5.0", "version_value": "5.0.5" }, { "platform": "Windows", "version_affected": "!\u003e=", "version_name": "4.1", "version_value": "4.1.13" } ] } } ] }, "vendor_name": "Palo Alto Networks" } ] } }, "configuration": [ { "lang": "en", "value": "This issue only affects Windows systems where local users are configured with file creation privileges to the root of the OS disk (C:\\) or \u0027Program Files\u0027 directory." } ], "credit": [ { "lang": "eng", "value": "Palo Alto Networks thanks Ratnesh Pandey of Bromium and Matthew Batten for discovering and reporting this issue." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An unquoted search path vulnerability in the Windows release of Global Protect Agent allows an authenticated local user with file creation privileges on the root of the OS disk (C:\\) or to Program Files directory to gain system privileges. This issue affects Palo Alto Networks GlobalProtect Agent 5.0 versions before 5.0.5; 4.1 versions before 4.1.13 on Windows;" } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-428 Unquoted Search Path or Element" } ] } ] }, "references": { "reference_data": [ { "name": "https://security.paloaltonetworks.com/CVE-2020-1988", "refsource": "MISC", "url": "https://security.paloaltonetworks.com/CVE-2020-1988" } ] }, "solution": [ { "lang": "en", "value": "This issue is fixed in Global Protect Agent 5.0.5, Global Protect Agent 4.1.13 and all later versions." } ], "source": { "defect": [ "GPC-9320" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2020-04-08T00:00:00", "value": "Initial publication" } ], "work_around": [ { "lang": "en", "value": "Do not grant file creation privileges on the root of the OS disk (C:\\) or \u0027Program Files\u0027 directory to unprivileged users." } ] } } }, "cveMetadata": { "assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "assignerShortName": "palo_alto", "cveId": "CVE-2020-1988", "datePublished": "2020-04-08T18:41:58.415618Z", "dateReserved": "2019-12-04T00:00:00", "dateUpdated": "2024-09-16T18:03:55.930Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-0019
Vulnerability from cvelistv5
Published
2022-02-10 18:10
Modified
2024-09-16 20:06
Severity ?
EPSS score ?
Summary
An insufficiently protected credentials vulnerability exists in the Palo Alto Networks GlobalProtect app on Linux that exposes the hashed credentials of GlobalProtect users that saved their password during previous GlobalProtect app sessions to other local users on the system. The exposed credentials enable a local attacker to authenticate to the GlobalProtect portal or gateway as the target user without knowing of the target user’s plaintext password. This issue impacts: GlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.10 on Linux. GlobalProtect app 5.2 versions earlier than and including GlobalProtect app 5.2.7 on Linux. GlobalProtect app 5.3 versions earlier than GlobalProtect app 5.3.2 on Linux. This issue does not affect the GlobalProtect app on other platforms.
References
▼ | URL | Tags |
---|---|---|
https://security.paloaltonetworks.com/CVE-2022-0019 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Palo Alto Networks | GlobalProtect App |
Version: 5.3 < 5.3.2 Version: 5.2 < Version: 5.1 < 5.1.10 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:18:41.591Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security.paloaltonetworks.com/CVE-2022-0019" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Linux" ], "product": "GlobalProtect App", "vendor": "Palo Alto Networks", "versions": [ { "changes": [ { "at": "5.3.2", "status": "unaffected" } ], "lessThan": "5.3.2", "status": "affected", "version": "5.3", "versionType": "custom" }, { "lessThanOrEqual": "5.2.7", "status": "affected", "version": "5.2", "versionType": "custom" }, { "changes": [ { "at": "5.1.10", "status": "unaffected" } ], "lessThan": "5.1.10", "status": "affected", "version": "5.1", "versionType": "custom" } ] } ], "configurations": [ { "lang": "en", "value": "This issue is applicable only to GlobalProtect app users that save their user credentials for use when authenticating to a GlobalProtect portal." } ], "credits": [ { "lang": "en", "value": "Palo Alto Networks thanks Josh Wisely and Praveen Bomma of Splunk for discovering and reporting this issue." } ], "datePublic": "2022-02-09T00:00:00", "descriptions": [ { "lang": "en", "value": "An insufficiently protected credentials vulnerability exists in the Palo Alto Networks GlobalProtect app on Linux that exposes the hashed credentials of GlobalProtect users that saved their password during previous GlobalProtect app sessions to other local users on the system. The exposed credentials enable a local attacker to authenticate to the GlobalProtect portal or gateway as the target user without knowing of the target user\u2019s plaintext password. This issue impacts: GlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.10 on Linux. GlobalProtect app 5.2 versions earlier than and including GlobalProtect app 5.2.7 on Linux. GlobalProtect app 5.3 versions earlier than GlobalProtect app 5.3.2 on Linux. This issue does not affect the GlobalProtect app on other platforms." } ], "exploits": [ { "lang": "en", "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-522", "description": "CWE-522 Insufficiently Protected Credentials", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-10T18:10:21", "orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "shortName": "palo_alto" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security.paloaltonetworks.com/CVE-2022-0019" } ], "solutions": [ { "lang": "en", "value": "This issue is fixed in GlobalProtect app 5.1.10 on Linux, GlobalProtect app 5.3.2 on Linux, and all later GlobalProtect app versions.\n\nExisting credentials files that are exposed by this issue will be secured when the fixed GlobalProtect app is launched." } ], "source": { "defect": [ "GPC-13843" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2022-02-09T00:00:00", "value": "Initial publication" } ], "title": "GlobalProtect App: Insufficiently Protected Credentials Vulnerability on Linux", "workarounds": [ { "lang": "en", "value": "Users should not save their credentials until the GlobalProtect app is upgraded to a fixed version.\n\nGlobalProtect portal administrators can prevent GlobalProtect app users from saving their credentials on the next connection to the GlobalProtect portal by preventing \u2018Save User Credentials\u2019 from the portal agent configuration as described here:\n\nhttps://docs.paloaltonetworks.com/globalprotect/10-1/globalprotect-admin/globalprotect-apps/deploy-app-settings-transparently/customizable-app-settings/user-behavior-options.html" } ], "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@paloaltonetworks.com", "DATE_PUBLIC": "2022-02-09T17:00:00.000Z", "ID": "CVE-2022-0019", "STATE": "PUBLIC", "TITLE": "GlobalProtect App: Insufficiently Protected Credentials Vulnerability on Linux" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "GlobalProtect App", "version": { "version_data": [ { "platform": "Linux", "version_affected": "\u003c", "version_name": "5.3", "version_value": "5.3.2" }, { "platform": "Linux", "version_affected": "\u003c=", "version_name": "5.2", "version_value": "5.2.7" }, { "platform": "Linux", "version_affected": "!\u003e=", "version_name": "5.3", "version_value": "5.3.2" }, { "platform": "Linux", "version_affected": "\u003c", "version_name": "5.1", "version_value": "5.1.10" }, { "platform": "Linux", "version_affected": "!\u003e=", "version_name": "5.1", "version_value": "5.1.10" } ] } } ] }, "vendor_name": "Palo Alto Networks" } ] } }, "configuration": [ { "lang": "en", "value": "This issue is applicable only to GlobalProtect app users that save their user credentials for use when authenticating to a GlobalProtect portal." } ], "credit": [ { "lang": "eng", "value": "Palo Alto Networks thanks Josh Wisely and Praveen Bomma of Splunk for discovering and reporting this issue." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An insufficiently protected credentials vulnerability exists in the Palo Alto Networks GlobalProtect app on Linux that exposes the hashed credentials of GlobalProtect users that saved their password during previous GlobalProtect app sessions to other local users on the system. The exposed credentials enable a local attacker to authenticate to the GlobalProtect portal or gateway as the target user without knowing of the target user\u2019s plaintext password. This issue impacts: GlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.10 on Linux. GlobalProtect app 5.2 versions earlier than and including GlobalProtect app 5.2.7 on Linux. GlobalProtect app 5.3 versions earlier than GlobalProtect app 5.3.2 on Linux. This issue does not affect the GlobalProtect app on other platforms." } ] }, "exploit": [ { "lang": "en", "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue." } ], "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-522 Insufficiently Protected Credentials" } ] } ] }, "references": { "reference_data": [ { "name": "https://security.paloaltonetworks.com/CVE-2022-0019", "refsource": "MISC", "url": "https://security.paloaltonetworks.com/CVE-2022-0019" } ] }, "solution": [ { "lang": "en", "value": "This issue is fixed in GlobalProtect app 5.1.10 on Linux, GlobalProtect app 5.3.2 on Linux, and all later GlobalProtect app versions.\n\nExisting credentials files that are exposed by this issue will be secured when the fixed GlobalProtect app is launched." } ], "source": { "defect": [ "GPC-13843" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2022-02-09T00:00:00", "value": "Initial publication" } ], "work_around": [ { "lang": "en", "value": "Users should not save their credentials until the GlobalProtect app is upgraded to a fixed version.\n\nGlobalProtect portal administrators can prevent GlobalProtect app users from saving their credentials on the next connection to the GlobalProtect portal by preventing \u2018Save User Credentials\u2019 from the portal agent configuration as described here:\n\nhttps://docs.paloaltonetworks.com/globalprotect/10-1/globalprotect-admin/globalprotect-apps/deploy-app-settings-transparently/customizable-app-settings/user-behavior-options.html" } ], "x_advisoryEoL": true, "x_affectedList": [ "GlobalProtect App 5.3.1", "GlobalProtect App 5.3.0", "GlobalProtect App 5.3", "GlobalProtect App 5.2.7", "GlobalProtect App 5.2.6", "GlobalProtect App 5.2.5", "GlobalProtect App 5.2.4", "GlobalProtect App 5.2.3", "GlobalProtect App 5.2.2", "GlobalProtect App 5.2.1", "GlobalProtect App 5.2.0", "GlobalProtect App 5.2", "GlobalProtect App 5.1.9", "GlobalProtect App 5.1.8", "GlobalProtect App 5.1.7", "GlobalProtect App 5.1.6", "GlobalProtect App 5.1.5", "GlobalProtect App 5.1.4", "GlobalProtect App 5.1.3", "GlobalProtect App 5.1.1", "GlobalProtect App 5.1.0", "GlobalProtect App 5.1" ], "x_likelyAffectedList": [ "GlobalProtect App 5.0.10", "GlobalProtect App 5.0.9", "GlobalProtect App 5.0.8", "GlobalProtect App 5.0.7", "GlobalProtect App 5.0.6", "GlobalProtect App 5.0.5", "GlobalProtect App 5.0.4", "GlobalProtect App 5.0.3", "GlobalProtect App 5.0.2", "GlobalProtect App 5.0.1", "GlobalProtect App 5.0.0", "GlobalProtect App 5.0", "GlobalProtect App 4.1.13", "GlobalProtect App 4.1.12", "GlobalProtect App 4.1.11", "GlobalProtect App 4.1.10", "GlobalProtect App 4.1.9", "GlobalProtect App 4.1.8", "GlobalProtect App 4.1.7", "GlobalProtect App 4.1.6", "GlobalProtect App 4.1.5", "GlobalProtect App 4.1.4", "GlobalProtect App 4.1.3", "GlobalProtect App 4.1.2", "GlobalProtect App 4.1.1", "GlobalProtect App 4.1.0", "GlobalProtect App 4.1", "GlobalProtect App 4.0.8", "GlobalProtect App 4.0.7", "GlobalProtect App 4.0.6", "GlobalProtect App 4.0.5", "GlobalProtect App 4.0.4", "GlobalProtect App 4.0.3", "GlobalProtect App 4.0.2", "GlobalProtect App 4.0.0", "GlobalProtect App 4.0", "GlobalProtect App 3.1.6", "GlobalProtect App 3.1.5", "GlobalProtect App 3.1.4", "GlobalProtect App 3.1.3", "GlobalProtect App 3.1.1", "GlobalProtect App 3.1.0", "GlobalProtect App 3.1", "GlobalProtect App 3.0.3", "GlobalProtect App 3.0.2", "GlobalProtect App 3.0.1", "GlobalProtect App 3.0.0", "GlobalProtect App 3.0", "GlobalProtect App 2.3.5", "GlobalProtect App 2.3.4", "GlobalProtect App 2.3.3", "GlobalProtect App 2.3.2", "GlobalProtect App 2.3.1", "GlobalProtect App 2.3.0", "GlobalProtect App 2.3", "GlobalProtect App 2.2.2", "GlobalProtect App 2.2.1", "GlobalProtect App 2.2.0", "GlobalProtect App 2.2", "GlobalProtect App 2.1.4", "GlobalProtect App 2.1.3", "GlobalProtect App 2.1.2", "GlobalProtect App 2.1.1", "GlobalProtect App 2.1.0", "GlobalProtect App 2.1", "GlobalProtect App 2.0.5", "GlobalProtect App 2.0.4", "GlobalProtect App 2.0.3", "GlobalProtect App 2.0.2", "GlobalProtect App 2.0.1", "GlobalProtect App 2.0.0", "GlobalProtect App 2.0", "GlobalProtect App 1.2.11", "GlobalProtect App 1.2.10", "GlobalProtect App 1.2.9", "GlobalProtect App 1.2.8", "GlobalProtect App 1.2.7", "GlobalProtect App 1.2.6", "GlobalProtect App 1.2.5", "GlobalProtect App 1.2.4", "GlobalProtect App 1.2.3", "GlobalProtect App 1.2.2", "GlobalProtect App 1.2.1", "GlobalProtect App 1.2.0", "GlobalProtect App 1.2", "GlobalProtect App 1.1.8", "GlobalProtect App 1.1.7", "GlobalProtect App 1.1.6", "GlobalProtect App 1.1.5", "GlobalProtect App 1.1.4", "GlobalProtect App 1.1.3", "GlobalProtect App 1.1.2", "GlobalProtect App 1.1.1", "GlobalProtect App 1.1.0", "GlobalProtect App 1.1", "GlobalProtect App 1.0.8", "GlobalProtect App 1.0.7", "GlobalProtect App 1.0.5", "GlobalProtect App 1.0.3", "GlobalProtect App 1.0.1", "GlobalProtect App 1.0" ] } } }, "cveMetadata": { "assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "assignerShortName": "palo_alto", "cveId": "CVE-2022-0019", "datePublished": "2022-02-10T18:10:21.940684Z", "dateReserved": "2021-12-28T00:00:00", "dateUpdated": "2024-09-16T20:06:53.694Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-2032
Vulnerability from cvelistv5
Published
2020-06-10 17:29
Modified
2024-09-17 02:27
Severity ?
EPSS score ?
Summary
A race condition vulnerability Palo Alto Networks GlobalProtect app on Windows allows a local limited Windows user to execute programs with SYSTEM privileges. This issue can be exploited only while performing a GlobalProtect app upgrade. This issue affects: GlobalProtect app 5.0 versions earlier than GlobalProtect app 5.0.10 on Windows; GlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.4 on Windows.
References
▼ | URL | Tags |
---|---|---|
https://security.paloaltonetworks.com/CVE-2020-2032 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Palo Alto Networks | GlobalProtect App |
Version: 5.1 < 5.1.4 Version: 5.0 < 5.0.10 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:54:00.590Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security.paloaltonetworks.com/CVE-2020-2032" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Windows" ], "product": "GlobalProtect App", "vendor": "Palo Alto Networks", "versions": [ { "changes": [ { "at": "5.1.4", "status": "unaffected" } ], "lessThan": "5.1.4", "status": "affected", "version": "5.1", "versionType": "custom" }, { "changes": [ { "at": "5.0.10", "status": "unaffected" } ], "lessThan": "5.0.10", "status": "affected", "version": "5.0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Palo Alto Networks thanks Rich Mirch of TeamARES from Critical Start Inc for discovering and reporting this issue." } ], "datePublic": "2020-06-10T00:00:00", "descriptions": [ { "lang": "en", "value": "A race condition vulnerability Palo Alto Networks GlobalProtect app on Windows allows a local limited Windows user to execute programs with SYSTEM privileges. This issue can be exploited only while performing a GlobalProtect app upgrade. This issue affects: GlobalProtect app 5.0 versions earlier than GlobalProtect app 5.0.10 on Windows; GlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.4 on Windows." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-367", "description": "CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-06-10T17:29:03", "orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "shortName": "palo_alto" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security.paloaltonetworks.com/CVE-2020-2032" } ], "solutions": [ { "lang": "en", "value": "This issue is fixed in GlobalProtect app 5.0.10, GlobalProtect app 5.1.4, and all later GlobalProtect app versions." } ], "source": { "defect": [ "GPC-10583" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2020-06-10T00:00:00", "value": "Initial publication" } ], "title": "GlobalProtect App: File race condition vulnerability leads to local privilege escalation during upgrade", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@paloaltonetworks.com", "DATE_PUBLIC": "2020-06-10T16:00:00.000Z", "ID": "CVE-2020-2032", "STATE": "PUBLIC", "TITLE": "GlobalProtect App: File race condition vulnerability leads to local privilege escalation during upgrade" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "GlobalProtect App", "version": { "version_data": [ { "platform": "Windows", "version_affected": "\u003c", "version_name": "5.1", "version_value": "5.1.4" }, { "platform": "Windows", "version_affected": "!\u003e=", "version_name": "5.1", "version_value": "5.1.4" }, { "platform": "Windows", "version_affected": "\u003c", "version_name": "5.0", "version_value": "5.0.10" }, { "platform": "Windows", "version_affected": "!\u003e=", "version_name": "5.0", "version_value": "5.0.10" } ] } } ] }, "vendor_name": "Palo Alto Networks" } ] } }, "credit": [ { "lang": "eng", "value": "Palo Alto Networks thanks Rich Mirch of TeamARES from Critical Start Inc for discovering and reporting this issue." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A race condition vulnerability Palo Alto Networks GlobalProtect app on Windows allows a local limited Windows user to execute programs with SYSTEM privileges. This issue can be exploited only while performing a GlobalProtect app upgrade. This issue affects: GlobalProtect app 5.0 versions earlier than GlobalProtect app 5.0.10 on Windows; GlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.4 on Windows." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition" } ] } ] }, "references": { "reference_data": [ { "name": "https://security.paloaltonetworks.com/CVE-2020-2032", "refsource": "MISC", "url": "https://security.paloaltonetworks.com/CVE-2020-2032" } ] }, "solution": [ { "lang": "en", "value": "This issue is fixed in GlobalProtect app 5.0.10, GlobalProtect app 5.1.4, and all later GlobalProtect app versions." } ], "source": { "defect": [ "GPC-10583" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2020-06-10T00:00:00", "value": "Initial publication" } ] } } }, "cveMetadata": { "assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "assignerShortName": "palo_alto", "cveId": "CVE-2020-2032", "datePublished": "2020-06-10T17:29:03.167538Z", "dateReserved": "2019-12-04T00:00:00", "dateUpdated": "2024-09-17T02:27:10.850Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-1989
Vulnerability from cvelistv5
Published
2020-04-08 18:41
Modified
2024-09-16 19:14
Severity ?
EPSS score ?
Summary
An incorrect privilege assignment vulnerability when writing application-specific files in the Palo Alto Networks Global Protect Agent for Linux on ARM platform allows a local authenticated user to gain root privileges on the system. This issue affects Palo Alto Networks Global Protect Agent for Linux 5.0 versions before 5.0.8; 5.1 versions before 5.1.1.
References
▼ | URL | Tags |
---|---|---|
https://security.paloaltonetworks.com/CVE-2020-1989 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Palo Alto Networks | Global Protect Agent |
Version: 5.0 < 5.0.8 Version: 5.1 < 5.1.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:54:00.592Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security.paloaltonetworks.com/CVE-2020-1989" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Linux ARM" ], "product": "Global Protect Agent", "vendor": "Palo Alto Networks", "versions": [ { "changes": [ { "at": "5.0.8", "status": "unaffected" } ], "lessThan": "5.0.8", "status": "affected", "version": "5.0", "versionType": "custom" }, { "changes": [ { "at": "5.1.1", "status": "unaffected" } ], "lessThan": "5.1.1", "status": "affected", "version": "5.1", "versionType": "custom" } ] } ], "datePublic": "2020-04-08T00:00:00", "descriptions": [ { "lang": "en", "value": "An incorrect privilege assignment vulnerability when writing application-specific files in the Palo Alto Networks Global Protect Agent for Linux on ARM platform allows a local authenticated user to gain root privileges on the system. This issue affects Palo Alto Networks Global Protect Agent for Linux 5.0 versions before 5.0.8; 5.1 versions before 5.1.1." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-266", "description": "CWE-266 Incorrect Privilege Assignment", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-04-08T18:41:58", "orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "shortName": "palo_alto" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security.paloaltonetworks.com/CVE-2020-1989" } ], "solutions": [ { "lang": "en", "value": "This issue is fixed in Global Protect Agent 5.0.8, Global Protect Agent 5.1.1 and all later versions." } ], "source": { "defect": [ "GPC-9358" ], "discovery": "INTERNAL" }, "timeline": [ { "lang": "en", "time": "2020-04-08T00:00:00", "value": "Initial publication" } ], "title": "Global Protect Agent: Incorrect privilege assignment allows local privilege escalation", "workarounds": [ { "lang": "en", "value": "There are no viable workarounds for this issue." } ], "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@paloaltonetworks.com", "DATE_PUBLIC": "2020-04-08T16:00:00.000Z", "ID": "CVE-2020-1989", "STATE": "PUBLIC", "TITLE": "Global Protect Agent: Incorrect privilege assignment allows local privilege escalation" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Global Protect Agent", "version": { "version_data": [ { "platform": "Linux ARM", "version_affected": "\u003c", "version_name": "5.0", "version_value": "5.0.8" }, { "platform": "Linux ARM", "version_affected": "\u003c", "version_name": "5.1", "version_value": "5.1.1" }, { "platform": "Linux ARM", "version_affected": "!\u003e=", "version_name": "5.0", "version_value": "5.0.8" }, { "platform": "Linux ARM", "version_affected": "!\u003e=", "version_name": "5.1", "version_value": "5.1.1" } ] } } ] }, "vendor_name": "Palo Alto Networks" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An incorrect privilege assignment vulnerability when writing application-specific files in the Palo Alto Networks Global Protect Agent for Linux on ARM platform allows a local authenticated user to gain root privileges on the system. This issue affects Palo Alto Networks Global Protect Agent for Linux 5.0 versions before 5.0.8; 5.1 versions before 5.1.1." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-266 Incorrect Privilege Assignment" } ] } ] }, "references": { "reference_data": [ { "name": "https://security.paloaltonetworks.com/CVE-2020-1989", "refsource": "MISC", "url": "https://security.paloaltonetworks.com/CVE-2020-1989" } ] }, "solution": [ { "lang": "en", "value": "This issue is fixed in Global Protect Agent 5.0.8, Global Protect Agent 5.1.1 and all later versions." } ], "source": { "defect": [ "GPC-9358" ], "discovery": "INTERNAL" }, "timeline": [ { "lang": "en", "time": "2020-04-08T00:00:00", "value": "Initial publication" } ], "work_around": [ { "lang": "en", "value": "There are no viable workarounds for this issue." } ] } } }, "cveMetadata": { "assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "assignerShortName": "palo_alto", "cveId": "CVE-2020-1989", "datePublished": "2020-04-08T18:41:58.456857Z", "dateReserved": "2019-12-04T00:00:00", "dateUpdated": "2024-09-16T19:14:44.124Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-15870
Vulnerability from cvelistv5
Published
2017-12-11 17:00
Modified
2024-08-05 20:04
Severity ?
EPSS score ?
Summary
Palo Alto Networks GlobalProtect Agent before 4.0.3 allows attackers with administration rights on the local station to gain SYSTEM privileges via vectors involving "image path execution hijacking."
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/102083 | vdb-entry, x_refsource_BID | |
https://security.paloaltonetworks.com/CVE-2017-15870 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T20:04:50.527Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "102083", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/102083" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.paloaltonetworks.com/CVE-2017-15870" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-12-05T00:00:00", "descriptions": [ { "lang": "en", "value": "Palo Alto Networks GlobalProtect Agent before 4.0.3 allows attackers with administration rights on the local station to gain SYSTEM privileges via vectors involving \"image path execution hijacking.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-02-17T16:03:45", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "102083", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/102083" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.paloaltonetworks.com/CVE-2017-15870" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-15870", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Palo Alto Networks GlobalProtect Agent before 4.0.3 allows attackers with administration rights on the local station to gain SYSTEM privileges via vectors involving \"image path execution hijacking.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "102083", "refsource": "BID", "url": "http://www.securityfocus.com/bid/102083" }, { "name": "https://security.paloaltonetworks.com/CVE-2017-15870", "refsource": "CONFIRM", "url": "https://security.paloaltonetworks.com/CVE-2017-15870" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-15870", "datePublished": "2017-12-11T17:00:00", "dateReserved": "2017-10-24T00:00:00", "dateUpdated": "2024-08-05T20:04:50.527Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-6606
Vulnerability from cvelistv5
Published
2013-08-31 17:00
Modified
2024-08-06 21:36
Severity ?
EPSS score ?
Summary
Palo Alto Networks GlobalProtect before 1.1.7, and NetConnect, does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof portal servers and obtain sensitive information via a crafted certificate.
References
▼ | URL | Tags |
---|---|---|
http://archives.neohapsis.com/archives/bugtraq/2012-10/0100.html | mailing-list, x_refsource_BUGTRAQ | |
https://security.paloaltonetworks.com/CVE-2012-6606 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:36:01.356Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20121017 MitM-vulnerability in Palo Alto Networks GlobalProtect", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2012-10/0100.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.paloaltonetworks.com/CVE-2012-6606" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-10-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Palo Alto Networks GlobalProtect before 1.1.7, and NetConnect, does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof portal servers and obtain sensitive information via a crafted certificate." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-02-17T16:03:43", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20121017 MitM-vulnerability in Palo Alto Networks GlobalProtect", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2012-10/0100.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.paloaltonetworks.com/CVE-2012-6606" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2012-6606", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Palo Alto Networks GlobalProtect before 1.1.7, and NetConnect, does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof portal servers and obtain sensitive information via a crafted certificate." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20121017 MitM-vulnerability in Palo Alto Networks GlobalProtect", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2012-10/0100.html" }, { "name": "https://security.paloaltonetworks.com/CVE-2012-6606", "refsource": "CONFIRM", "url": "https://security.paloaltonetworks.com/CVE-2012-6606" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2012-6606", "datePublished": "2013-08-31T17:00:00", "dateReserved": "2013-08-31T00:00:00", "dateUpdated": "2024-08-06T21:36:01.356Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-0006
Vulnerability from cvelistv5
Published
2023-04-12 16:41
Modified
2024-08-02 04:54
Severity ?
EPSS score ?
Summary
A local file deletion vulnerability in the Palo Alto Networks GlobalProtect app on Windows devices enables a user to delete system files from the endpoint with elevated privileges through a race condition.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Palo Alto Networks | GlobalProtect app |
Version: 6.0 < 6.0.4 Version: 6.1 < 6.1.1 Version: 5.2 < 5.2.13 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.563Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://security.paloaltonetworks.com/CVE-2023-0006" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "GlobalProtect app", "vendor": "Palo Alto Networks", "versions": [ { "changes": [ { "at": "6.0.4", "status": "unaffected" } ], "lessThan": "6.0.4", "status": "affected", "version": "6.0", "versionType": "custom" }, { "changes": [ { "at": "6.1.1", "status": "unaffected" } ], "lessThan": "6.1.1", "status": "affected", "version": "6.1", "versionType": "custom" }, { "changes": [ { "at": "5.2.13", "status": "unaffected" } ], "lessThan": "5.2.13", "status": "affected", "version": "5.2", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Palo Alto Networks thanks Marcin Gebarowski for discovering and reporting this issue." } ], "datePublic": "2023-04-12T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A local file deletion vulnerability in the Palo Alto Networks GlobalProtect app on Windows devices enables a user to delete system files from the endpoint with elevated privileges through a race condition." } ], "value": "A local file deletion vulnerability in the Palo Alto Networks GlobalProtect app on Windows devices enables a user to delete system files from the endpoint with elevated privileges through a race condition." } ], "exploits": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue.\u003cbr\u003e" } ], "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-367", "description": "CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-14T19:41:29.587Z", "orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "shortName": "palo_alto" }, "references": [ { "url": "https://security.paloaltonetworks.com/CVE-2023-0006" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "This issue is fixed in GlobalProtect app 5.2.13, GlobalProtect app 6.0.4, GlobalProtect app 6.1.1, and all later GlobalProtect app versions on Windows devices.\u003cbr\u003e" } ], "value": "This issue is fixed in GlobalProtect app 5.2.13, GlobalProtect app 6.0.4, GlobalProtect app 6.1.1, and all later GlobalProtect app versions on Windows devices.\n" } ], "source": { "defect": [ "GPC-15378" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2023-04-12T16:00:00.000Z", "value": "Initial publication" } ], "title": "GlobalProtect App: Local File Deletion Vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "assignerShortName": "palo_alto", "cveId": "CVE-2023-0006", "datePublished": "2023-04-12T16:41:39.573Z", "dateReserved": "2022-10-27T18:48:15.159Z", "dateUpdated": "2024-08-02T04:54:32.563Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-3038
Vulnerability from cvelistv5
Published
2021-04-20 03:15
Modified
2024-09-16 17:49
Severity ?
EPSS score ?
Summary
A denial-of-service (DoS) vulnerability in Palo Alto Networks GlobalProtect app on Windows systems allows a limited Windows user to send specifically-crafted input to the GlobalProtect app that results in a Windows blue screen of death (BSOD) error. This issue impacts: GlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.8; GlobalProtect app 5.2 versions earlier than GlobalProtect app 5.2.4.
References
▼ | URL | Tags |
---|---|---|
https://security.paloaltonetworks.com/CVE-2021-3038 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Palo Alto Networks | GlobalProtect App |
Version: 5.1 < 5.1.8 Version: 5.2 < 5.2.4 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T16:45:50.745Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security.paloaltonetworks.com/CVE-2021-3038" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Windows" ], "product": "GlobalProtect App", "vendor": "Palo Alto Networks", "versions": [ { "changes": [ { "at": "5.1.8", "status": "unaffected" } ], "lessThan": "5.1.8", "status": "affected", "version": "5.1", "versionType": "custom" }, { "changes": [ { "at": "5.2.4", "status": "unaffected" } ], "lessThan": "5.2.4", "status": "affected", "version": "5.2", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Palo Alto Networks thanks Christophe Schleypen from NCIA / NCIRC for discovering and reporting this issue." } ], "datePublic": "2021-04-14T00:00:00", "descriptions": [ { "lang": "en", "value": "A denial-of-service (DoS) vulnerability in Palo Alto Networks GlobalProtect app on Windows systems allows a limited Windows user to send specifically-crafted input to the GlobalProtect app that results in a Windows blue screen of death (BSOD) error. This issue impacts: GlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.8; GlobalProtect app 5.2 versions earlier than GlobalProtect app 5.2.4." } ], "exploits": [ { "lang": "en", "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-248", "description": "CWE-248 Uncaught Exception", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-04-20T03:15:18", "orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "shortName": "palo_alto" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security.paloaltonetworks.com/CVE-2021-3038" } ], "solutions": [ { "lang": "en", "value": "This issue is fixed in GlobalProtect app 5.1.8, GlobalProtect app 5.2.4, and all later GlobalProtect app versions." } ], "source": { "defect": [ "GPC-10983" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2021-04-14T00:00:00", "value": "Initial publication" } ], "title": "GlobalProtect App: Windows VPN kernel driver denial of service (DoS)", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@paloaltonetworks.com", "DATE_PUBLIC": "2021-04-14T16:00:00.000Z", "ID": "CVE-2021-3038", "STATE": "PUBLIC", "TITLE": "GlobalProtect App: Windows VPN kernel driver denial of service (DoS)" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "GlobalProtect App", "version": { "version_data": [ { "platform": "Windows", "version_affected": "\u003c", "version_name": "5.1", "version_value": "5.1.8" }, { "platform": "Windows", "version_affected": "!\u003e=", "version_name": "5.1", "version_value": "5.1.8" }, { "platform": "Windows", "version_affected": "\u003c", "version_name": "5.2", "version_value": "5.2.4" }, { "platform": "Windows", "version_affected": "!\u003e=", "version_name": "5.2", "version_value": "5.2.4" } ] } } ] }, "vendor_name": "Palo Alto Networks" } ] } }, "credit": [ { "lang": "eng", "value": "Palo Alto Networks thanks Christophe Schleypen from NCIA / NCIRC for discovering and reporting this issue." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A denial-of-service (DoS) vulnerability in Palo Alto Networks GlobalProtect app on Windows systems allows a limited Windows user to send specifically-crafted input to the GlobalProtect app that results in a Windows blue screen of death (BSOD) error. This issue impacts: GlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.8; GlobalProtect app 5.2 versions earlier than GlobalProtect app 5.2.4." } ] }, "exploit": [ { "lang": "en", "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue." } ], "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20 Improper Input Validation" } ] }, { "description": [ { "lang": "eng", "value": "CWE-248 Uncaught Exception" } ] } ] }, "references": { "reference_data": [ { "name": "https://security.paloaltonetworks.com/CVE-2021-3038", "refsource": "MISC", "url": "https://security.paloaltonetworks.com/CVE-2021-3038" } ] }, "solution": [ { "lang": "en", "value": "This issue is fixed in GlobalProtect app 5.1.8, GlobalProtect app 5.2.4, and all later GlobalProtect app versions." } ], "source": { "defect": [ "GPC-10983" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2021-04-14T00:00:00", "value": "Initial publication" } ], "x_advisoryEoL": false, "x_affectedList": [ "GlobalProtect App 5.2.3", "GlobalProtect App 5.2.2", "GlobalProtect App 5.2.1", "GlobalProtect App 5.2.0", "GlobalProtect App 5.2", "GlobalProtect App 5.1.7", "GlobalProtect App 5.1.6", "GlobalProtect App 5.1.5", "GlobalProtect App 5.1.4", "GlobalProtect App 5.1.3", "GlobalProtect App 5.1.1", "GlobalProtect App 5.1.0", "GlobalProtect App 5.1" ] } } }, "cveMetadata": { "assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "assignerShortName": "palo_alto", "cveId": "CVE-2021-3038", "datePublished": "2021-04-20T03:15:18.565071Z", "dateReserved": "2021-01-06T00:00:00", "dateUpdated": "2024-09-16T17:49:11.570Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-0018
Vulnerability from cvelistv5
Published
2022-02-10 18:10
Modified
2024-09-16 23:36
Severity ?
EPSS score ?
Summary
An information exposure vulnerability exists in the Palo Alto Networks GlobalProtect app on Windows and MacOS where the credentials of the local user account are sent to the GlobalProtect portal when the Single Sign-On feature is enabled in the GlobalProtect portal configuration. This product behavior is intentional and poses no security risk when connecting to trusted GlobalProtect portals configured to use the same Single Sign-On credentials both for the local user account as well as the GlobalProtect login. However when the credentials are different, the local account credentials are inadvertently sent to the GlobalProtect portal for authentication. A third party MITM type of attacker cannot see these credentials in transit. This vulnerability is a concern where the GlobalProtect app is deployed on Bring-your-Own-Device (BYOD) type of clients with private local user accounts or GlobalProtect app is used to connect to different organizations. Fixed versions of GlobalProtect app have an app setting to prevent the transmission of the user's local user credentials to the target GlobalProtect portal regardless of the portal configuration. This issue impacts: GlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.10 on Windows and MacOS; GlobalProtect app 5.2 versions earlier than GlobalProtect app 5.2.9 on Windows and MacOS This issue does not affect GlobalProtect app on other platforms.
References
▼ | URL | Tags |
---|---|---|
https://security.paloaltonetworks.com/CVE-2022-0018 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | Palo Alto Networks | GlobalProtect App |
Version: 5.2 < 5.2.9 Version: 5.1 < 5.1.10 |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:18:41.280Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security.paloaltonetworks.com/CVE-2022-0018" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Windows and MacOS" ], "product": "GlobalProtect App", "vendor": "Palo Alto Networks", "versions": [ { "changes": [ { "at": "5.2.9", "status": "unaffected" } ], "lessThan": "5.2.9", "status": "affected", "version": "5.2", "versionType": "custom" }, { "changes": [ { "at": "5.1.10", "status": "unaffected" } ], "lessThan": "5.1.10", "status": "affected", "version": "5.1", "versionType": "custom" } ] }, { "product": "GlobalProtect App", "vendor": "Palo Alto Networks", "versions": [ { "status": "unaffected", "version": "5.3.*" } ] } ], "credits": [ { "lang": "en", "value": "Palo Alto Networks thanks Irina Belyaeva of Jet Infosystems for discovering and reporting this issue." } ], "datePublic": "2022-02-09T00:00:00", "descriptions": [ { "lang": "en", "value": "An information exposure vulnerability exists in the Palo Alto Networks GlobalProtect app on Windows and MacOS where the credentials of the local user account are sent to the GlobalProtect portal when the Single Sign-On feature is enabled in the GlobalProtect portal configuration. This product behavior is intentional and poses no security risk when connecting to trusted GlobalProtect portals configured to use the same Single Sign-On credentials both for the local user account as well as the GlobalProtect login. However when the credentials are different, the local account credentials are inadvertently sent to the GlobalProtect portal for authentication. A third party MITM type of attacker cannot see these credentials in transit. This vulnerability is a concern where the GlobalProtect app is deployed on Bring-your-Own-Device (BYOD) type of clients with private local user accounts or GlobalProtect app is used to connect to different organizations. Fixed versions of GlobalProtect app have an app setting to prevent the transmission of the user\u0027s local user credentials to the target GlobalProtect portal regardless of the portal configuration. This issue impacts: GlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.10 on Windows and MacOS; GlobalProtect app 5.2 versions earlier than GlobalProtect app 5.2.9 on Windows and MacOS This issue does not affect GlobalProtect app on other platforms." } ], "exploits": [ { "lang": "en", "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-201", "description": "CWE-201 Information Exposure Through Sent Data", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-10T18:10:20", "orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "shortName": "palo_alto" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security.paloaltonetworks.com/CVE-2022-0018" } ], "solutions": [ { "lang": "en", "value": "This issue is fixed in GlobalProtect app 5.1.10 on Windows and MacOS, GlobalProtect app 5.2.9 on Windows and MacOS, and all later GlobalProtect app versions with the \u2018force-disable-sso\u2019 app setting.\n\nSet \u2018force-disable-sso\u2019 to \u2018yes\u2019 to prevent unintended transmission of the local user credentials as described here:\nhttps://docs.paloaltonetworks.com/globalprotect/10-1/globalprotect-admin/globalprotect-apps/deploy-app-settings-transparently/customizable-app-settings/app-behavior-options.html" } ], "source": { "defect": [ "GPC-14203" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2022-02-09T00:00:00", "value": "Initial publication" } ], "title": "GlobalProtect App: Information Exposure Vulnerability When Connecting to GlobalProtect Portal With Single Sign-On Enabled", "workarounds": [ { "lang": "en", "value": "There are no known workarounds for this issue." } ], "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@paloaltonetworks.com", "DATE_PUBLIC": "2022-02-09T17:00:00.000Z", "ID": "CVE-2022-0018", "STATE": "PUBLIC", "TITLE": "GlobalProtect App: Information Exposure Vulnerability When Connecting to GlobalProtect Portal With Single Sign-On Enabled" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "GlobalProtect App", "version": { "version_data": [ { "platform": "Windows and MacOS", "version_affected": "\u003c", "version_name": "5.2", "version_value": "5.2.9" }, { "platform": "Windows and MacOS", "version_affected": "!\u003e=", "version_name": "5.2", "version_value": "5.2.9" }, { "platform": "Windows and MacOS", "version_affected": "\u003c", "version_name": "5.1", "version_value": "5.1.10" }, { "platform": "Windows and MacOS", "version_affected": "!\u003e=", "version_name": "5.1", "version_value": "5.1.10" }, { "version_affected": "!", "version_name": "5.3", "version_value": "5.3.*" } ] } } ] }, "vendor_name": "Palo Alto Networks" } ] } }, "credit": [ { "lang": "eng", "value": "Palo Alto Networks thanks Irina Belyaeva of Jet Infosystems for discovering and reporting this issue." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An information exposure vulnerability exists in the Palo Alto Networks GlobalProtect app on Windows and MacOS where the credentials of the local user account are sent to the GlobalProtect portal when the Single Sign-On feature is enabled in the GlobalProtect portal configuration. This product behavior is intentional and poses no security risk when connecting to trusted GlobalProtect portals configured to use the same Single Sign-On credentials both for the local user account as well as the GlobalProtect login. However when the credentials are different, the local account credentials are inadvertently sent to the GlobalProtect portal for authentication. A third party MITM type of attacker cannot see these credentials in transit. This vulnerability is a concern where the GlobalProtect app is deployed on Bring-your-Own-Device (BYOD) type of clients with private local user accounts or GlobalProtect app is used to connect to different organizations. Fixed versions of GlobalProtect app have an app setting to prevent the transmission of the user\u0027s local user credentials to the target GlobalProtect portal regardless of the portal configuration. This issue impacts: GlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.10 on Windows and MacOS; GlobalProtect app 5.2 versions earlier than GlobalProtect app 5.2.9 on Windows and MacOS This issue does not affect GlobalProtect app on other platforms." } ] }, "exploit": [ { "lang": "en", "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue." } ], "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-201 Information Exposure Through Sent Data" } ] } ] }, "references": { "reference_data": [ { "name": "https://security.paloaltonetworks.com/CVE-2022-0018", "refsource": "MISC", "url": "https://security.paloaltonetworks.com/CVE-2022-0018" } ] }, "solution": [ { "lang": "en", "value": "This issue is fixed in GlobalProtect app 5.1.10 on Windows and MacOS, GlobalProtect app 5.2.9 on Windows and MacOS, and all later GlobalProtect app versions with the \u2018force-disable-sso\u2019 app setting.\n\nSet \u2018force-disable-sso\u2019 to \u2018yes\u2019 to prevent unintended transmission of the local user credentials as described here:\nhttps://docs.paloaltonetworks.com/globalprotect/10-1/globalprotect-admin/globalprotect-apps/deploy-app-settings-transparently/customizable-app-settings/app-behavior-options.html" } ], "source": { "defect": [ "GPC-14203" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2022-02-09T00:00:00", "value": "Initial publication" } ], "work_around": [ { "lang": "en", "value": "There are no known workarounds for this issue." } ], "x_advisoryEoL": true, "x_affectedList": [ "GlobalProtect App 5.2.8", "GlobalProtect App 5.2.7", "GlobalProtect App 5.2.6", "GlobalProtect App 5.2.5", "GlobalProtect App 5.2.4", "GlobalProtect App 5.2.3", "GlobalProtect App 5.2.2", "GlobalProtect App 5.2.1", "GlobalProtect App 5.2.0", "GlobalProtect App 5.2", "GlobalProtect App 5.1.9", "GlobalProtect App 5.1.8", "GlobalProtect App 5.1.7", "GlobalProtect App 5.1.6", "GlobalProtect App 5.1.5", "GlobalProtect App 5.1.4", "GlobalProtect App 5.1.3", "GlobalProtect App 5.1.1", "GlobalProtect App 5.1.0", "GlobalProtect App 5.1" ], "x_likelyAffectedList": [ "GlobalProtect App 5.0.10", "GlobalProtect App 5.0.9", "GlobalProtect App 5.0.8", "GlobalProtect App 5.0.7", "GlobalProtect App 5.0.6", "GlobalProtect App 5.0.5", "GlobalProtect App 5.0.4", "GlobalProtect App 5.0.3", "GlobalProtect App 5.0.2", "GlobalProtect App 5.0.1", "GlobalProtect App 5.0.0", "GlobalProtect App 5.0", "GlobalProtect App 4.1.13", "GlobalProtect App 4.1.12", "GlobalProtect App 4.1.11", "GlobalProtect App 4.1.10", "GlobalProtect App 4.1.9", "GlobalProtect App 4.1.8", "GlobalProtect App 4.1.7", "GlobalProtect App 4.1.6", "GlobalProtect App 4.1.5", "GlobalProtect App 4.1.4", "GlobalProtect App 4.1.3", "GlobalProtect App 4.1.2", "GlobalProtect App 4.1.1", "GlobalProtect App 4.1.0", "GlobalProtect App 4.1", "GlobalProtect App 4.0.8", "GlobalProtect App 4.0.7", "GlobalProtect App 4.0.6", "GlobalProtect App 4.0.5", "GlobalProtect App 4.0.4", "GlobalProtect App 4.0.3", "GlobalProtect App 4.0.2", "GlobalProtect App 4.0.0", "GlobalProtect App 4.0", "GlobalProtect App 3.1.6", "GlobalProtect App 3.1.5", "GlobalProtect App 3.1.4", "GlobalProtect App 3.1.3", "GlobalProtect App 3.1.1", "GlobalProtect App 3.1.0", "GlobalProtect App 3.1", "GlobalProtect App 3.0.3", "GlobalProtect App 3.0.2", "GlobalProtect App 3.0.1", "GlobalProtect App 3.0.0", "GlobalProtect App 3.0", "GlobalProtect App 2.3.5", "GlobalProtect App 2.3.4", "GlobalProtect App 2.3.3", "GlobalProtect App 2.3.2", "GlobalProtect App 2.3.1", "GlobalProtect App 2.3.0", "GlobalProtect App 2.3", "GlobalProtect App 2.2.2", "GlobalProtect App 2.2.1", "GlobalProtect App 2.2.0", "GlobalProtect App 2.2", "GlobalProtect App 2.1.4", "GlobalProtect App 2.1.3", "GlobalProtect App 2.1.2", "GlobalProtect App 2.1.1", "GlobalProtect App 2.1.0", "GlobalProtect App 2.1", "GlobalProtect App 2.0.5", "GlobalProtect App 2.0.4", "GlobalProtect App 2.0.3", "GlobalProtect App 2.0.2", "GlobalProtect App 2.0.1", "GlobalProtect App 2.0.0", "GlobalProtect App 2.0", "GlobalProtect App 1.2.11", "GlobalProtect App 1.2.10", "GlobalProtect App 1.2.9", "GlobalProtect App 1.2.8", "GlobalProtect App 1.2.7", "GlobalProtect App 1.2.6", "GlobalProtect App 1.2.5", "GlobalProtect App 1.2.4", "GlobalProtect App 1.2.3", "GlobalProtect App 1.2.2", "GlobalProtect App 1.2.1", "GlobalProtect App 1.2.0", "GlobalProtect App 1.2", "GlobalProtect App 1.1.8", "GlobalProtect App 1.1.7", "GlobalProtect App 1.1.6", "GlobalProtect App 1.1.5", "GlobalProtect App 1.1.4", "GlobalProtect App 1.1.3", "GlobalProtect App 1.1.2", "GlobalProtect App 1.1.1", "GlobalProtect App 1.1.0", "GlobalProtect App 1.1", "GlobalProtect App 1.0.8", "GlobalProtect App 1.0.7", "GlobalProtect App 1.0.5", "GlobalProtect App 1.0.3", "GlobalProtect App 1.0.1", "GlobalProtect App 1.0" ] } } }, "cveMetadata": { "assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "assignerShortName": "palo_alto", "cveId": "CVE-2022-0018", "datePublished": "2022-02-10T18:10:20.308594Z", "dateReserved": "2021-12-28T00:00:00", "dateUpdated": "2024-09-16T23:36:47.780Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2020-02-12 23:15
Modified
2024-11-21 05:11
Severity ?
4.7 (Medium) - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
A denial-of-service (DoS) vulnerability in Palo Alto Networks GlobalProtect software running on Mac OS allows authenticated local users to cause the Mac OS kernel to hang or crash. This issue affects GlobalProtect 5.0.5 and earlier versions of GlobalProtect 5.0 on Mac OS.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
paloaltonetworks | globalprotect | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:macos:*:*", "matchCriteriaId": "5FD4E490-E203-44CC-87F7-E1871B1A9A09", "versionEndIncluding": "5.0.5", "versionStartIncluding": "5.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A denial-of-service (DoS) vulnerability in Palo Alto Networks GlobalProtect software running on Mac OS allows authenticated local users to cause the Mac OS kernel to hang or crash. This issue affects GlobalProtect 5.0.5 and earlier versions of GlobalProtect 5.0 on Mac OS." }, { "lang": "es", "value": "Una vulnerabilidad de denegaci\u00f3n de servicio (DoS) en el software GlobalProtect de Palo Alto Networks ejecut\u00e1ndose en Mac OS permite a usuarios locales autenticados causar la suspensi\u00f3n o bloqueo del kernel de Mac OS. Este problema afecta a GlobalProtect versi\u00f3n 5.0.5 y anteriores de GlobalProtect versi\u00f3n 5.0 en Mac OS." } ], "id": "CVE-2020-1976", "lastModified": "2024-11-21T05:11:46.160", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.0, "impactScore": 3.6, "source": "psirt@paloaltonetworks.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-02-12T23:15:11.500", "references": [ { "source": "psirt@paloaltonetworks.com", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2020-1976" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2020-1976" } ], "sourceIdentifier": "psirt@paloaltonetworks.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-642" } ], "source": "psirt@paloaltonetworks.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-12-11 17:29
Modified
2024-11-21 03:15
Severity ?
Summary
Palo Alto Networks GlobalProtect Agent before 4.0.3 allows attackers with administration rights on the local station to gain SYSTEM privileges via vectors involving "image path execution hijacking."
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.securityfocus.com/bid/102083 | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://security.paloaltonetworks.com/CVE-2017-15870 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/102083 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.paloaltonetworks.com/CVE-2017-15870 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
paloaltonetworks | globalprotect | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:mac_os_x:*:*", "matchCriteriaId": "A82EF876-A5E2-4693-BECF-288BACFA5756", "versionEndIncluding": "4.0.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Palo Alto Networks GlobalProtect Agent before 4.0.3 allows attackers with administration rights on the local station to gain SYSTEM privileges via vectors involving \"image path execution hijacking.\"" }, { "lang": "es", "value": "Palo Alto Networks GlobalProtect Agent en versiones anteriores a la 4.0.3 permite que atacantes con permisos de administraci\u00f3n en la estaci\u00f3n local obtengan privilegios SYSTEM mediante vectores relacionados con \"image path execution hijacking\"." } ], "id": "CVE-2017-15870", "lastModified": "2024-11-21T03:15:22.340", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-12-11T17:29:00.347", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/102083" }, { "source": "cve@mitre.org", "url": "https://security.paloaltonetworks.com/CVE-2017-15870" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/102083" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.paloaltonetworks.com/CVE-2017-15870" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-08-14 17:15
Modified
2024-08-20 16:23
Severity ?
Summary
A privilege escalation (PE) vulnerability in the Palo Alto Networks GlobalProtect app on Windows devices enables a local user to execute programs with elevated privileges.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@paloaltonetworks.com | https://security.paloaltonetworks.com/CVE-2024-5915 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
paloaltonetworks | globalprotect | * | |
paloaltonetworks | globalprotect | * | |
paloaltonetworks | globalprotect | * | |
paloaltonetworks | globalprotect | * | |
paloaltonetworks | globalprotect | 6.3.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:windows:*:*", "matchCriteriaId": "6EFB2A77-273D-4FB8-B509-F8E5AA32F040", "versionEndIncluding": "5.1.9", "versionStartIncluding": "5.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:windows:*:*", "matchCriteriaId": "CC06EA04-F76C-456E-91A0-4164CE2CFABB", "versionEndIncluding": "6.0.6", "versionStartIncluding": "6.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:windows:*:*", "matchCriteriaId": "921C45B7-68A7-4D30-B9E3-EF6D95E366F8", "versionEndExcluding": "6.1.5", "versionStartIncluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:windows:*:*", "matchCriteriaId": "7BBF0FF3-EBFD-4299-95D7-D65DDC532954", "versionEndExcluding": "6.2.4", "versionStartIncluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:6.3.0:*:*:*:*:windows:*:*", "matchCriteriaId": "CF300947-06F7-4027-B57A-1F3388233670", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A privilege escalation (PE) vulnerability in the Palo Alto Networks GlobalProtect app on Windows devices enables a local user to execute programs with elevated privileges." }, { "lang": "es", "value": " Una vulnerabilidad de escalada de privilegios (PE) en la aplicaci\u00f3n Palo Alto Networks GlobalProtect en dispositivos Windows permite a un usuario local ejecutar programas con privilegios elevados." } ], "id": "CVE-2024-5915", "lastModified": "2024-08-20T16:23:10.493", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "attackComplexity": "LOW", "attackRequirements": "PRESENT", "attackVector": "LOCAL", "automatable": "NO", "availabilityRequirements": "NOT_DEFINED", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityRequirements": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "AMBER", "recovery": "AUTOMATIC", "safety": "NOT_DEFINED", "subsequentSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "HIGH", "subsequentSystemIntegrity": "HIGH", "userInteraction": "NONE", "valueDensity": "DIFFUSE", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:A/V:D/RE:M/U:Amber", "version": "4.0", "vulnerabilityResponseEffort": "MODERATE", "vulnerableSystemAvailability": "NONE", "vulnerableSystemConfidentiality": "NONE", "vulnerableSystemIntegrity": "LOW" }, "source": "psirt@paloaltonetworks.com", "type": "Secondary" } ] }, "published": "2024-08-14T17:15:18.403", "references": [ { "source": "psirt@paloaltonetworks.com", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2024-5915" } ], "sourceIdentifier": "psirt@paloaltonetworks.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-732" } ], "source": "psirt@paloaltonetworks.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-732" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-06-12 17:15
Modified
2024-11-21 09:48
Severity ?
Summary
A problem with the Palo Alto Networks GlobalProtect app can result in exposure of encrypted user credentials, used for connecting to GlobalProtect, in application logs. Normally, these application logs are only viewable by local users and are included when generating logs for troubleshooting purposes. This means that these encrypted credentials are exposed to recipients of the application logs.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
paloaltonetworks | globalprotect | * | |
paloaltonetworks | globalprotect | * | |
paloaltonetworks | globalprotect | * | |
paloaltonetworks | globalprotect | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:*:*:*", "matchCriteriaId": "5E575C68-D93F-4C48-9F6F-2448581BEF43", "versionEndExcluding": "5.1.12", "versionStartIncluding": "5.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:*:*:*", "matchCriteriaId": "5557AF19-F260-4764-9263-CD2EEC5EB659", "versionEndExcluding": "6.0.8", "versionStartIncluding": "6.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:*:*:*", "matchCriteriaId": "2839949C-D855-48F5-8B46-CCA9DFECE25D", "versionEndExcluding": "6.1.3", "versionStartIncluding": "6.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:*:*:*", "matchCriteriaId": "D3F3AC34-AB9B-485D-B0F8-67F673D1D4CC", "versionEndExcluding": "6.2.3", "versionStartIncluding": "6.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A problem with the Palo Alto Networks GlobalProtect app can result in exposure of encrypted user credentials, used for connecting to GlobalProtect, in application logs. Normally, these application logs are only viewable by local users and are included when generating logs for troubleshooting purposes. This means that these encrypted credentials are exposed to recipients of the application logs." }, { "lang": "es", "value": "Un problema con la aplicaci\u00f3n Palo Alto Networks GlobalProtect puede provocar la exposici\u00f3n de las credenciales de usuario cifradas, utilizadas para conectarse a GlobalProtect, en los registros de la aplicaci\u00f3n. Normalmente, estos registros de aplicaciones solo son visibles para usuarios locales y se incluyen al generar registros para solucionar problemas. Esto significa que estas credenciales cifradas est\u00e1n expuestas a los destinatarios de los registros de la aplicaci\u00f3n." } ], "id": "CVE-2024-5908", "lastModified": "2024-11-21T09:48:33.597", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "attackComplexity": "LOW", "attackRequirements": "PRESENT", "attackVector": "NETWORK", "automatable": "NO", "availabilityRequirements": "NOT_DEFINED", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityRequirements": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "privilegesRequired": "NONE", "providerUrgency": "AMBER", "recovery": "USER", "safety": "NOT_DEFINED", "subsequentSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "HIGH", "subsequentSystemIntegrity": "HIGH", "userInteraction": "ACTIVE", "valueDensity": "DIFFUSE", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:N/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:U/V:D/RE:M/U:Amber", "version": "4.0", "vulnerabilityResponseEffort": "MODERATE", "vulnerableSystemAvailability": "NONE", "vulnerableSystemConfidentiality": "LOW", "vulnerableSystemIntegrity": "NONE" }, "source": "psirt@paloaltonetworks.com", "type": "Secondary" } ] }, "published": "2024-06-12T17:15:53.253", "references": [ { "source": "psirt@paloaltonetworks.com", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2024-5908" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2024-5908" } ], "sourceIdentifier": "psirt@paloaltonetworks.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-532" } ], "source": "psirt@paloaltonetworks.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-532" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-05-13 19:15
Modified
2024-11-21 05:24
Severity ?
6.8 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
Under certain circumstances a user's password may be logged in cleartext in the PanGPS.log diagnostic file when logs are collected for troubleshooting on GlobalProtect app (also known as GlobalProtect Agent) for MacOS and Windows. For this issue to occur all of these conditions must be true: (1) 'Save User Credential' option should be set to 'Yes' in the GlobalProtect Portal's Agent configuration, (2) the GlobalProtect user manually selects a gateway, (3) and the logging level is set to 'Dump' while collecting troubleshooting logs. This issue does not affect GlobalProtect app on other platforms (for example iOS/Android/Linux). This issue affects GlobalProtect app 5.0 versions earlier than 5.0.9, GlobalProtect app 5.1 versions earlier than 5.1.2 on Windows or MacOS. Since becoming aware of the issue, Palo Alto Networks has safely deleted all the known GlobalProtectLogs zip files sent by customers with the credentials. We now filter and remove these credentials from all files sent to Customer Support. The GlobalProtectLogs zip files uploaded to Palo Alto Networks systems were only accessible by authorized personnel with valid Palo Alto Networks credentials. We do not have any evidence of malicious access or use of these credentials.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@paloaltonetworks.com | https://security.paloaltonetworks.com/CVE-2020-2004 | Mitigation, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.paloaltonetworks.com/CVE-2020-2004 | Mitigation, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
paloaltonetworks | globalprotect | * | |
paloaltonetworks | globalprotect | * | |
paloaltonetworks | globalprotect | * | |
paloaltonetworks | globalprotect | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:macos:*:*", "matchCriteriaId": "E1C3559D-B1AF-4E7E-B478-064B03BC4B74", "versionEndExcluding": "5.0.9", "versionStartIncluding": "5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:windows:*:*", "matchCriteriaId": "ED7517A7-68E4-485B-B0A0-FDCADA3813E0", "versionEndExcluding": "5.0.9", "versionStartIncluding": "5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:macos:*:*", "matchCriteriaId": "16065771-C1A9-4EF1-A3FD-482F862E68FE", "versionEndExcluding": "5.1.2", "versionStartIncluding": "5.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:windows:*:*", "matchCriteriaId": "DA6691CC-A568-4E6B-95FC-E30A6F6D493D", "versionEndExcluding": "5.1.2", "versionStartIncluding": "5.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Under certain circumstances a user\u0027s password may be logged in cleartext in the PanGPS.log diagnostic file when logs are collected for troubleshooting on GlobalProtect app (also known as GlobalProtect Agent) for MacOS and Windows. For this issue to occur all of these conditions must be true: (1) \u0027Save User Credential\u0027 option should be set to \u0027Yes\u0027 in the GlobalProtect Portal\u0027s Agent configuration, (2) the GlobalProtect user manually selects a gateway, (3) and the logging level is set to \u0027Dump\u0027 while collecting troubleshooting logs. This issue does not affect GlobalProtect app on other platforms (for example iOS/Android/Linux). This issue affects GlobalProtect app 5.0 versions earlier than 5.0.9, GlobalProtect app 5.1 versions earlier than 5.1.2 on Windows or MacOS. Since becoming aware of the issue, Palo Alto Networks has safely deleted all the known GlobalProtectLogs zip files sent by customers with the credentials. We now filter and remove these credentials from all files sent to Customer Support. The GlobalProtectLogs zip files uploaded to Palo Alto Networks systems were only accessible by authorized personnel with valid Palo Alto Networks credentials. We do not have any evidence of malicious access or use of these credentials." }, { "lang": "es", "value": "Bajo determinadas circunstancias, la contrase\u00f1a de usuario puede ser registrada en texto sin cifrar en el archivo de diagn\u00f3stico PanGPS.log cuando registros son recolectados para la soluci\u00f3n de problemas en la aplicaci\u00f3n GlobalProtect (tambi\u00e9n se conoce como Agente GlobalProtect) para MacOS y Windows. Para que este problema se presente, todas estas condiciones deben ser ciertas: (1) la opci\u00f3n \"Save User Credential\" debe establecerse en \"Yes\" en la configuraci\u00f3n del Agente del portal de GlobalProtect, (2) el usuario de GlobalProtect selecciona manualmente una puerta de enlace, (3) y el nivel de registro se establece en \"Dump\" al recolectar registros de soluci\u00f3n de problemas. Este problema no afecta a la aplicaci\u00f3n GlobalProtect en otras plataformas (por ejemplo, iOS/Android/Linux). Este problema afecta a la aplicaci\u00f3n GlobalProtect versiones 5.0 anteriores a 5.0.9, la aplicaci\u00f3n GlobalProtect versiones 5.1 anteriores a 5.1.2 en Windows o MacOS. Desde que se percibi\u00f3 el problema, Palo Alto Networks ha eliminado de forma segura todos los archivos zip de GlobalProtectLogs conocidos enviados por los clientes con las credenciales. Ahora filtramos y eliminamos estas credenciales de todos los archivos enviados a Atenci\u00f3n al Cliente. Los archivos zip de GlobalProtectLogs cargados en los sistemas de Palo Alto Networks solo fueron accesibles por personal autorizado con credenciales v\u00e1lidas de Palo Alto Networks. No tenemos evidencia de acceso malicioso o uso de estas credenciales." } ], "id": "CVE-2020-2004", "lastModified": "2024-11-21T05:24:25.340", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 1.7, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.1, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L", "version": "3.1" }, "exploitabilityScore": 1.3, "impactScore": 5.5, "source": "psirt@paloaltonetworks.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-05-13T19:15:13.190", "references": [ { "source": "psirt@paloaltonetworks.com", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2020-2004" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2020-2004" } ], "sourceIdentifier": "psirt@paloaltonetworks.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-534" } ], "source": "psirt@paloaltonetworks.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-532" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-04-08 19:15
Modified
2024-11-21 05:11
Severity ?
3.9 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Summary
An information exposure vulnerability in the logging component of Palo Alto Networks Global Protect Agent allows a local authenticated user to read VPN cookie information when the troubleshooting logging level is set to "Dump". This issue affects Palo Alto Networks Global Protect Agent 5.0 versions prior to 5.0.9; 5.1 versions prior to 5.1.1.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
paloaltonetworks | globalprotect | * | |
paloaltonetworks | globalprotect | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:*:*:*", "matchCriteriaId": "7C63FA07-3534-433F-B7F4-AE94CC03D916", "versionEndExcluding": "5.0.9", "versionStartIncluding": "5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C8B2577-975B-4603-8AC8-26D632948202", "versionEndExcluding": "5.1.1", "versionStartIncluding": "5.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An information exposure vulnerability in the logging component of Palo Alto Networks Global Protect Agent allows a local authenticated user to read VPN cookie information when the troubleshooting logging level is set to \"Dump\". This issue affects Palo Alto Networks Global Protect Agent 5.0 versions prior to 5.0.9; 5.1 versions prior to 5.1.1." }, { "lang": "es", "value": "Una vulnerabilidad de exposici\u00f3n de informaci\u00f3n en el componente logging del Global Protect Agent de Palo Alto Networks, permite a un usuario autenticado local leer informaci\u00f3n de la cookie VPN cuando el nivel de registro de soluci\u00f3n de problemas se establece en \"Dump\". Este problema afecta a Palo Alto Networks versiones 5.0 anteriores a 5.0.9; 5.1 versiones anteriores a 5.1.1." } ], "id": "CVE-2020-1987", "lastModified": "2024-11-21T05:11:47.583", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.9, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.3, "impactScore": 2.5, "source": "psirt@paloaltonetworks.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-04-08T19:15:13.837", "references": [ { "source": "psirt@paloaltonetworks.com", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2020-1987" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2020-1987" } ], "sourceIdentifier": "psirt@paloaltonetworks.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "psirt@paloaltonetworks.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-532" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-04-08 19:15
Modified
2024-11-21 05:11
Severity ?
7.0 (High) - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
An incorrect privilege assignment vulnerability when writing application-specific files in the Palo Alto Networks Global Protect Agent for Linux on ARM platform allows a local authenticated user to gain root privileges on the system. This issue affects Palo Alto Networks Global Protect Agent for Linux 5.0 versions before 5.0.8; 5.1 versions before 5.1.1.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
paloaltonetworks | globalprotect | * | |
paloaltonetworks | globalprotect | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:linux:*:*", "matchCriteriaId": "D70632D3-BC9C-4D9E-AC68-9EB8725A17B8", "versionEndExcluding": "5.0.8", "versionStartIncluding": "5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:linux:*:*", "matchCriteriaId": "B0C1F67A-B22D-43D2-9C16-5ABBD53E3693", "versionEndExcluding": "5.1.1", "versionStartIncluding": "5.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An incorrect privilege assignment vulnerability when writing application-specific files in the Palo Alto Networks Global Protect Agent for Linux on ARM platform allows a local authenticated user to gain root privileges on the system. This issue affects Palo Alto Networks Global Protect Agent for Linux 5.0 versions before 5.0.8; 5.1 versions before 5.1.1." }, { "lang": "es", "value": "Una vulnerabilidad de asignaci\u00f3n de privilegios incorrecta cuando se escriben archivos espec\u00edficos de la aplicaci\u00f3n en el Global Protect Agent de Palo Alto Networks para Linux en la plataforma ARM, permite a un usuario autenticado local alcanzar privilegios root sobre el sistema. Este problema afecta al Global Protect Agent de Palo Alto Networks para Linux versiones 5.0 anteriores a 5.0.8; versiones 5.1 anteriores a 5.1.1." } ], "id": "CVE-2020-1989", "lastModified": "2024-11-21T05:11:47.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.0, "impactScore": 5.9, "source": "psirt@paloaltonetworks.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-04-08T19:15:13.993", "references": [ { "source": "psirt@paloaltonetworks.com", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2020-1989" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2020-1989" } ], "sourceIdentifier": "psirt@paloaltonetworks.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-266" } ], "source": "psirt@paloaltonetworks.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-269" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-04-09 22:29
Modified
2024-11-21 04:36
Severity ?
2.5 (Low) - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
2.5 (Low) - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
2.5 (Low) - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
Summary
GlobalProtect Agent 4.1.0 for Windows and GlobalProtect Agent 4.1.10 and earlier for macOS may allow a local authenticated attacker who has compromised the end-user account and gained the ability to inspect memory, to access authentication and/or session tokens and replay them to spoof the VPN session and gain access as the user.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
paloaltonetworks | globalprotect | * | |
paloaltonetworks | globalprotect | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:windows:*:*", "matchCriteriaId": "A38DA3B1-2CCD-4320-B802-BFF1B24994C4", "versionEndIncluding": "4.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:macos:*:*", "matchCriteriaId": "4E5BE83D-C94B-4382-8673-697896208A77", "versionEndIncluding": "4.1.10", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "GlobalProtect Agent 4.1.0 for Windows and GlobalProtect Agent 4.1.10 and earlier for macOS may allow a local authenticated attacker who has compromised the end-user account and gained the ability to inspect memory, to access authentication and/or session tokens and replay them to spoof the VPN session and gain access as the user." }, { "lang": "es", "value": "GlobalProtect Agent versi\u00f3n 4.1.0 para Windows y GlobalProtect Agent versi\u00f3n 4.1.10 y anteriores para macOS pueden permitir un atacante autenticado local que haya comprometido la cuenta del usuario final y haya obtenido la capacidad de inspeccionar la memoria, para acceder a los tokens de autenticaci\u00f3n y/o sesi\u00f3n y los reproduzca para falsificar la sesi\u00f3n VPN y conseguir acceso como usuario." } ], "id": "CVE-2019-1573", "lastModified": "2024-11-21T04:36:50.333", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.0, "impactScore": 1.4, "source": "psirt@paloaltonetworks.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.0, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-04-09T22:29:00.877", "references": [ { "source": "psirt@paloaltonetworks.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/107868" }, { "source": "psirt@paloaltonetworks.com", "tags": [ "Third Party Advisory" ], "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0005" }, { "source": "psirt@paloaltonetworks.com", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2019-1573" }, { "source": "psirt@paloaltonetworks.com", "tags": [ "Third Party Advisory" ], "url": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2019-783" }, { "source": "psirt@paloaltonetworks.com", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.kb.cert.org/vuls/id/192371" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/107868" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0005" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2019-1573" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2019-783" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.kb.cert.org/vuls/id/192371" } ], "sourceIdentifier": "psirt@paloaltonetworks.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-226" } ], "source": "psirt@paloaltonetworks.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-311" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-06-10 18:15
Modified
2024-11-21 05:24
Severity ?
7.0 (High) - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
7.0 (High) - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
7.0 (High) - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
A race condition vulnerability Palo Alto Networks GlobalProtect app on Windows allows a local limited Windows user to execute programs with SYSTEM privileges. This issue can be exploited only while performing a GlobalProtect app upgrade. This issue affects: GlobalProtect app 5.0 versions earlier than GlobalProtect app 5.0.10 on Windows; GlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.4 on Windows.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
paloaltonetworks | globalprotect | * | |
paloaltonetworks | globalprotect | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:windows:*:*", "matchCriteriaId": "2D325D3A-D857-4528-A6CC-0E8142A38C58", "versionEndExcluding": "5.0.10", "versionStartIncluding": "5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:windows:*:*", "matchCriteriaId": "5BF3D585-3F87-492B-8CE9-54122A2D228A", "versionEndExcluding": "5.1.4", "versionStartIncluding": "5.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A race condition vulnerability Palo Alto Networks GlobalProtect app on Windows allows a local limited Windows user to execute programs with SYSTEM privileges. This issue can be exploited only while performing a GlobalProtect app upgrade. This issue affects: GlobalProtect app 5.0 versions earlier than GlobalProtect app 5.0.10 on Windows; GlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.4 on Windows." }, { "lang": "es", "value": "Una vulnerabilidad de condici\u00f3n de carrera en la aplicaci\u00f3n GlobalProtect de Palo Alto Networks en Windows, permite a un usuario local limitado de Windows ejecutar programas con privilegios SYSTEM. Este problema solo puede ser explotado mientras se realiza una actualizaci\u00f3n de la aplicaci\u00f3n GlobalProtect. Este problema afecta a: la aplicaci\u00f3n GlobalProtect versiones 5.0 anteriores a la aplicaci\u00f3n GlobalProtect versi\u00f3n 5.0.10 en Windows; La aplicaci\u00f3n GlobalProtect versiones 5.1 anteriores a la aplicaci\u00f3n GlobalProtect versi\u00f3n 5.1.4 en Windows" } ], "id": "CVE-2020-2032", "lastModified": "2024-11-21T05:24:30.247", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.0, "impactScore": 5.9, "source": "psirt@paloaltonetworks.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.0, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-10T18:15:11.780", "references": [ { "source": "psirt@paloaltonetworks.com", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2020-2032" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2020-2032" } ], "sourceIdentifier": "psirt@paloaltonetworks.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-367" } ], "source": "psirt@paloaltonetworks.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-367" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-06-10 18:15
Modified
2024-11-21 05:24
Severity ?
5.3 (Medium) - CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
5.3 (Medium) - CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
5.3 (Medium) - CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Summary
When the pre-logon feature is enabled, a missing certification validation in Palo Alto Networks GlobalProtect app can disclose the pre-logon authentication cookie to a man-in-the-middle attacker on the same local area network segment with the ability to manipulate ARP or to conduct ARP spoofing attacks. This allows the attacker to access the GlobalProtect Server as allowed by configured Security rules for the 'pre-login' user. This access may be limited compared to the network access of regular users. This issue affects: GlobalProtect app 5.0 versions earlier than GlobalProtect app 5.0.10 when the prelogon feature is enabled; GlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.4 when the prelogon feature is enabled.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
paloaltonetworks | globalprotect | * | |
paloaltonetworks | globalprotect | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:windows:*:*", "matchCriteriaId": "2D325D3A-D857-4528-A6CC-0E8142A38C58", "versionEndExcluding": "5.0.10", "versionStartIncluding": "5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:windows:*:*", "matchCriteriaId": "5BF3D585-3F87-492B-8CE9-54122A2D228A", "versionEndExcluding": "5.1.4", "versionStartIncluding": "5.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "When the pre-logon feature is enabled, a missing certification validation in Palo Alto Networks GlobalProtect app can disclose the pre-logon authentication cookie to a man-in-the-middle attacker on the same local area network segment with the ability to manipulate ARP or to conduct ARP spoofing attacks. This allows the attacker to access the GlobalProtect Server as allowed by configured Security rules for the \u0027pre-login\u0027 user. This access may be limited compared to the network access of regular users. This issue affects: GlobalProtect app 5.0 versions earlier than GlobalProtect app 5.0.10 when the prelogon feature is enabled; GlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.4 when the prelogon feature is enabled." }, { "lang": "es", "value": "Cuando la funcionalidad pre-logon est\u00e1 habilitada, una falta de comprobaci\u00f3n de certificaci\u00f3n en la aplicaci\u00f3n GlobalProtect de Palo Alto Networks puede revelar la cookie de autenticaci\u00f3n de pre-logon a un atacante de tipo man-in-the-middle en el mismo segmento de red de \u00e1rea local con la capacidad de manipular ARP o conducir ataques de suplantaci\u00f3n de identidad de ARP. Esto permite al atacante acceder al servidor GlobalProtect de acuerdo a lo permitido por las reglas de seguridad configuradas para el usuario \"pre-login\". Este acceso puede ser limitado comparado con el acceso a la red de los usuarios habituales. Este problema afecta a: la aplicaci\u00f3n GlobalProtect versiones 5.0 anteriores a la aplicaci\u00f3n GlobalProtect versi\u00f3n 5.0.10 cuando la funci\u00f3n de inicio de sesi\u00f3n est\u00e1 habilitada; La aplicaci\u00f3n GlobalProtect versiones 5.1 anteriores a la aplicaci\u00f3n GlobalProtect versi\u00f3n 5.1.4, cuando la funcionalidad pre-logon est\u00e1 habilitada" } ], "id": "CVE-2020-2033", "lastModified": "2024-11-21T05:24:30.417", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:A/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 5.5, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 3.6, "source": "psirt@paloaltonetworks.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-10T18:15:11.860", "references": [ { "source": "psirt@paloaltonetworks.com", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2020-2033" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2020-2033" } ], "sourceIdentifier": "psirt@paloaltonetworks.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-290" }, { "lang": "en", "value": "CWE-295" } ], "source": "psirt@paloaltonetworks.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-290" }, { "lang": "en", "value": "CWE-295" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-02-10 18:15
Modified
2024-11-21 06:37
Severity ?
4.7 (Medium) - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
An insufficiently protected credentials vulnerability exists in the Palo Alto Networks GlobalProtect app on Linux that exposes the hashed credentials of GlobalProtect users that saved their password during previous GlobalProtect app sessions to other local users on the system. The exposed credentials enable a local attacker to authenticate to the GlobalProtect portal or gateway as the target user without knowing of the target user’s plaintext password. This issue impacts: GlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.10 on Linux. GlobalProtect app 5.2 versions earlier than and including GlobalProtect app 5.2.7 on Linux. GlobalProtect app 5.3 versions earlier than GlobalProtect app 5.3.2 on Linux. This issue does not affect the GlobalProtect app on other platforms.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
paloaltonetworks | globalprotect | * | |
paloaltonetworks | globalprotect | * | |
paloaltonetworks | globalprotect | * | |
linux | linux_kernel | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:*:*:*", "matchCriteriaId": "E84FC1F6-58F6-4C67-A8E9-93233865C080", "versionEndExcluding": "5.1.10", "versionStartIncluding": "5.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:*:*:*", "matchCriteriaId": "E4FEBC14-2794-48FB-B210-5E720254E7B8", "versionEndIncluding": "5.2.7", "versionStartIncluding": "5.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:*:*:*", "matchCriteriaId": "3170EC23-3410-43B0-8D72-48297059954A", "versionEndExcluding": "5.3.2", "versionStartIncluding": "5.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An insufficiently protected credentials vulnerability exists in the Palo Alto Networks GlobalProtect app on Linux that exposes the hashed credentials of GlobalProtect users that saved their password during previous GlobalProtect app sessions to other local users on the system. The exposed credentials enable a local attacker to authenticate to the GlobalProtect portal or gateway as the target user without knowing of the target user\u2019s plaintext password. This issue impacts: GlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.10 on Linux. GlobalProtect app 5.2 versions earlier than and including GlobalProtect app 5.2.7 on Linux. GlobalProtect app 5.3 versions earlier than GlobalProtect app 5.3.2 on Linux. This issue does not affect the GlobalProtect app on other platforms." }, { "lang": "es", "value": "Se presenta una vulnerabilidad de credenciales insuficientemente protegidas en GlobalProtect app de Palo Alto Networks en Linux que expone las credenciales con hash de los usuarios de GlobalProtect que guardaron su contrase\u00f1a durante sesiones anteriores de GlobalProtect app a otros usuarios locales del sistema. Las credenciales expuestas permiten a un atacante local autenticarse en el portal o la puerta de enlace de GlobalProtect como el usuario de destino sin conocer la contrase\u00f1a en texto plano del usuario de destino. Este problema afecta: GlobalProtect app 5.1 versiones anteriores a GlobalProtect app 5.1.10 en Linux. GlobalProtect app versiones 5.2 anteriores a GlobalProtect app 5.2.7 en Linux. GlobalProtect app versiones 5.3 anteriores a GlobalProtect app 5.3.2 en Linux. Este problema no afecta a GlobalProtect app en otras plataformas" } ], "id": "CVE-2022-0019", "lastModified": "2024-11-21T06:37:49.870", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.0, "impactScore": 3.6, "source": "psirt@paloaltonetworks.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-02-10T18:15:08.687", "references": [ { "source": "psirt@paloaltonetworks.com", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2022-0019" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2022-0019" } ], "sourceIdentifier": "psirt@paloaltonetworks.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-522" } ], "source": "psirt@paloaltonetworks.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-522" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-06-14 17:15
Modified
2024-11-21 07:36
Severity ?
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
A local privilege escalation (PE) vulnerability in the Palo Alto Networks GlobalProtect app on Windows enables a local user to execute programs with elevated privileges.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
paloaltonetworks | globalprotect | * | |
paloaltonetworks | globalprotect | * | |
paloaltonetworks | globalprotect | 6.1.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:windows:*:*", "matchCriteriaId": "956FAE55-7B54-42C2-A4B8-6F050EBDFFA9", "versionEndExcluding": "5.2.13", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:windows:*:*", "matchCriteriaId": "183C9FEF-3A2F-46F4-9150-D4CFF978B0CA", "versionEndExcluding": "6.0.5", "versionStartIncluding": "6.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:6.1.0:*:*:*:*:windows:*:*", "matchCriteriaId": "4ED230C2-F7FC-4CEF-BBBC-E44A68A1ADDA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A local privilege escalation (PE) vulnerability in the Palo Alto Networks GlobalProtect app on Windows enables a local user to execute programs with elevated privileges.\n" } ], "id": "CVE-2023-0009", "lastModified": "2024-11-21T07:36:23.103", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "psirt@paloaltonetworks.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-06-14T17:15:09.043", "references": [ { "source": "psirt@paloaltonetworks.com", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2023-0009" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2023-0009" } ], "sourceIdentifier": "psirt@paloaltonetworks.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-807" } ], "source": "psirt@paloaltonetworks.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-10-09 17:15
Modified
2024-11-21 09:54
Severity ?
Summary
A privilege escalation vulnerability in the Palo Alto Networks GlobalProtect app on Windows allows a locally authenticated non-administrative Windows user to escalate their privileges to NT AUTHORITY/SYSTEM through the use of the repair functionality offered by the .msi file used to install GlobalProtect.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
paloaltonetworks | globalprotect | * | |
paloaltonetworks | globalprotect | 6.3.0 | |
paloaltonetworks | globalprotect | 6.3.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:windows:*:*", "matchCriteriaId": "7E2CBAA4-7E71-4769-BBD6-6AF13714E565", "versionEndExcluding": "6.2.5", "versionStartIncluding": "5.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:6.3.0:*:*:*:*:windows:*:*", "matchCriteriaId": "CF300947-06F7-4027-B57A-1F3388233670", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:6.3.1:*:*:*:*:windows:*:*", "matchCriteriaId": "11061375-2C2C-47B4-A3ED-B1DA70F96642", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A privilege escalation vulnerability in the Palo Alto Networks GlobalProtect app on Windows allows a locally authenticated non-administrative Windows user to escalate their privileges to NT AUTHORITY/SYSTEM through the use of the repair functionality offered by the .msi file used to install GlobalProtect." }, { "lang": "es", "value": "Una vulnerabilidad de escalada de privilegios en la aplicaci\u00f3n Palo Alto Networks GlobalProtect en Windows permite que un usuario de Windows no administrativo autenticado localmente escale sus privilegios a NT AUTHORITY/SYSTEM mediante el uso de la funcionalidad de reparaci\u00f3n ofrecida por el archivo .msi utilizado para instalar GlobalProtect." } ], "id": "CVE-2024-9473", "lastModified": "2024-11-21T09:54:26.150", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "attackComplexity": "LOW", "attackRequirements": "PRESENT", "attackVector": "LOCAL", "automatable": "NO", "availabilityRequirements": "NOT_DEFINED", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityRequirements": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "AMBER", "recovery": "USER", "safety": "NOT_DEFINED", "subsequentSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "HIGH", "subsequentSystemIntegrity": "HIGH", "userInteraction": "NONE", "valueDensity": "CONCENTRATED", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:U/V:C/RE:M/U:Amber", "version": "4.0", "vulnerabilityResponseEffort": "MODERATE", "vulnerableSystemAvailability": "NONE", "vulnerableSystemConfidentiality": "NONE", "vulnerableSystemIntegrity": "LOW" }, "source": "psirt@paloaltonetworks.com", "type": "Secondary" } ] }, "published": "2024-10-09T17:15:21.230", "references": [ { "source": "psirt@paloaltonetworks.com", "url": "https://sec-consult.com/vulnerability-lab/advisory/local-privilege-escalation-via-msi-installer-in-palo-alto-networks-globalprotect/" }, { "source": "psirt@paloaltonetworks.com", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2024-9473" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/fulldisclosure/2024/Oct/2" } ], "sourceIdentifier": "psirt@paloaltonetworks.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-250" } ], "source": "psirt@paloaltonetworks.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-04-08 19:15
Modified
2024-11-21 05:11
Severity ?
4.2 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
An unquoted search path vulnerability in the Windows release of Global Protect Agent allows an authenticated local user with file creation privileges on the root of the OS disk (C:\) or to Program Files directory to gain system privileges. This issue affects Palo Alto Networks GlobalProtect Agent 5.0 versions before 5.0.5; 4.1 versions before 4.1.13 on Windows;
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
paloaltonetworks | globalprotect | * | |
paloaltonetworks | globalprotect | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:windows:*:*", "matchCriteriaId": "F7EC5C47-7311-433B-B557-4713EDB75137", "versionEndExcluding": "4.1.13", "versionStartIncluding": "4.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:windows:*:*", "matchCriteriaId": "5DB0FF9B-4A27-460D-806B-F5D54FD39E89", "versionEndExcluding": "5.0.5", "versionStartIncluding": "5.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An unquoted search path vulnerability in the Windows release of Global Protect Agent allows an authenticated local user with file creation privileges on the root of the OS disk (C:\\) or to Program Files directory to gain system privileges. This issue affects Palo Alto Networks GlobalProtect Agent 5.0 versions before 5.0.5; 4.1 versions before 4.1.13 on Windows;" }, { "lang": "es", "value": "Una vulnerabilidad de ruta de b\u00fasqueda sin comillas en la versi\u00f3n de Windows del Global Protect Agent, permite a un usuario local autenticado con privilegios de creaci\u00f3n de archivos en la root del disco del Sistema Operativo (C:\\) o al directorio Program Files para alcanzar privilegios system. Este problema afecta a Global Protect Agent de Palo Alto Networks versiones 5.0 anteriores a 5.0.5; versiones 4.1 anteriores a 4.1.13 en Windows;" } ], "id": "CVE-2020-1988", "lastModified": "2024-11-21T05:11:47.710", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 3.4, "source": "psirt@paloaltonetworks.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-04-08T19:15:13.917", "references": [ { "source": "psirt@paloaltonetworks.com", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2020-1988" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2020-1988" } ], "sourceIdentifier": "psirt@paloaltonetworks.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-428" } ], "source": "psirt@paloaltonetworks.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-428" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-09-11 17:15
Modified
2024-10-03 00:26
Severity ?
Summary
An information exposure vulnerability exists in Palo Alto Networks PAN-OS software that enables a GlobalProtect end user to learn both the configured GlobalProtect uninstall password and the configured disable or disconnect passcode. After the password or passcode is known, end users can uninstall, disable, or disconnect GlobalProtect even if the GlobalProtect app configuration would not normally permit them to do so.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@paloaltonetworks.com | https://security.paloaltonetworks.com/CVE-2024-8687 | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", "matchCriteriaId": "5C73941F-EBEE-4A03-94A4-B4C7C96E4963", "versionEndExcluding": "8.1.25", "versionStartIncluding": "8.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", "matchCriteriaId": "89A55C5F-8E01-42C4-BE93-D683900C07BE", "versionEndExcluding": "9.0.17", "versionStartIncluding": "9.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", "matchCriteriaId": "56181B13-327B-4249-A7E8-246B2420CEFC", "versionEndExcluding": "9.1.16", "versionStartIncluding": "9.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", "matchCriteriaId": "71F1F86A-8158-4BE8-B509-5F50421DA829", "versionEndExcluding": "10.0.12", "versionStartIncluding": "10.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", "matchCriteriaId": "18EE46C0-B863-4AE4-833C-05030D8AD1AF", "versionEndExcluding": "10.1.9", "versionStartIncluding": "10.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", "matchCriteriaId": "D61F01F8-1598-4078-9D98-BFF5B62F3BA5", "versionEndExcluding": "10.2.4", "versionStartIncluding": "10.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:11.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "6F3693A5-182E-4723-BE2A-062D0C9E736C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:*:*:*", "matchCriteriaId": "B67C7EC3-6A0C-4068-A40C-3CA3CE670E02", "versionEndExcluding": "5.1.12", "versionStartIncluding": "5.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4E58F8A-5040-432C-9B6B-1890F33A0FB3", "versionEndExcluding": "5.2.13", "versionStartIncluding": "5.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:*:*:*", "matchCriteriaId": "4ACA99D7-01F8-4BEE-9CC9-AF8AA1121DAB", "versionEndExcluding": "6.0.7", "versionStartIncluding": "6.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:*:*:*", "matchCriteriaId": "C4BDBA4C-CEE9-4B47-82EE-3B58A04EB649", "versionEndExcluding": "6.1.2", "versionStartIncluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:6.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "780045AA-5D59-4D8C-B742-B48B58DAD8F0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:paloaltonetworks:prisma_access:-:*:*:*:*:*:*:*", "matchCriteriaId": "FFB6FBC7-DEEB-4571-BCF9-92345A4B614A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", "matchCriteriaId": "456CB3CF-DCDA-4A0A-8DC0-72DBD713D3BE", "versionEndExcluding": "10.2.9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An information exposure vulnerability exists in Palo Alto Networks PAN-OS software that enables a GlobalProtect end user to learn both the configured GlobalProtect uninstall password and the configured disable or disconnect passcode. After the password or passcode is known, end users can uninstall, disable, or disconnect GlobalProtect even if the GlobalProtect app configuration would not normally permit them to do so." }, { "lang": "es", "value": "Existe una vulnerabilidad de exposici\u00f3n de informaci\u00f3n en el software PAN-OS de Palo Alto Networks que permite que un usuario final de GlobalProtect conozca tanto la contrase\u00f1a de desinstalaci\u00f3n de GlobalProtect configurada como el c\u00f3digo de acceso de deshabilitaci\u00f3n o desconexi\u00f3n configurado. Una vez que se conoce la contrase\u00f1a o el c\u00f3digo de acceso, los usuarios finales pueden desinstalar, deshabilitar o desconectar GlobalProtect incluso si la configuraci\u00f3n de la aplicaci\u00f3n GlobalProtect normalmente no les permitir\u00eda hacerlo." } ], "id": "CVE-2024-8687", "lastModified": "2024-10-03T00:26:56.110", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 4.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "LOCAL", "automatable": "NO", "availabilityRequirements": "NOT_DEFINED", "baseScore": 6.9, "baseSeverity": "MEDIUM", "confidentialityRequirements": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "AMBER", "recovery": "AUTOMATIC", "safety": "NOT_DEFINED", "subsequentSystemAvailability": "NONE", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "userInteraction": "NONE", "valueDensity": "DIFFUSE", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:A/V:D/RE:M/U:Amber", "version": "4.0", "vulnerabilityResponseEffort": "MODERATE", "vulnerableSystemAvailability": "LOW", "vulnerableSystemConfidentiality": "HIGH", "vulnerableSystemIntegrity": "NONE" }, "source": "psirt@paloaltonetworks.com", "type": "Secondary" } ] }, "published": "2024-09-11T17:15:14.157", "references": [ { "source": "psirt@paloaltonetworks.com", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2024-8687" } ], "sourceIdentifier": "psirt@paloaltonetworks.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-497" } ], "source": "psirt@paloaltonetworks.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-10-16 19:15
Modified
2024-11-21 04:32
Severity ?
Summary
A Local Privilege Escalation vulnerability exists in the GlobalProtect Agent for Windows 5.0.3 and earlier, and GlobalProtect Agent for Windows 4.1.12 and earlier, in which the auto-update feature can allow for modification of a GlobalProtect Agent MSI installer package on disk before installation.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
paloaltonetworks | globalprotect | * | |
paloaltonetworks | globalprotect | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:windows:*:*", "matchCriteriaId": "33D9B4A6-36A7-49F3-9028-48C58746D57E", "versionEndIncluding": "5.0.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:windows:*:*", "matchCriteriaId": "85CDCEA9-5BA9-425A-AC6B-743AD1FCCAB2", "versionEndIncluding": "4.1.12", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Local Privilege Escalation vulnerability exists in the GlobalProtect Agent for Windows 5.0.3 and earlier, and GlobalProtect Agent for Windows 4.1.12 and earlier, in which the auto-update feature can allow for modification of a GlobalProtect Agent MSI installer package on disk before installation." }, { "lang": "es", "value": "Se presenta una vulnerabilidad de Escalada de Privilegios Local en GlobalProtect Agent para Windows versi\u00f3n 5.0.3 y anteriores, y GlobalProtect Agent para Windows versi\u00f3n 4.1.12 y anteriores, en la que la funcionalidad auto-update puede permitir la modificaci\u00f3n de un paquete instalador MSI de GlobalProtect Agent en el disco antes de la instalaci\u00f3n." } ], "id": "CVE-2019-17435", "lastModified": "2024-11-21T04:32:19.547", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-10-16T19:15:16.003", "references": [ { "source": "psirt@paloaltonetworks.com", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2019-17435" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2019-17435" } ], "sourceIdentifier": "psirt@paloaltonetworks.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-02-10 18:15
Modified
2024-11-21 06:37
Severity ?
7.0 (High) - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
An improper link resolution before file access ('link following') vulnerability exists in the Palo Alto Networks GlobalProtect app on Windows that enables a local attacker to disrupt system processes and potentially execute arbitrary code with SYSTEM privileges under certain circumstances. This issue impacts: GlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.10 on Windows. GlobalProtect app 5.2 versions earlier than GlobalProtect app 5.2.5 on Windows. This issue does not affect GlobalProtect app on other platforms.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
paloaltonetworks | globalprotect | * | |
paloaltonetworks | globalprotect | * | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:*:*:*", "matchCriteriaId": "E84FC1F6-58F6-4C67-A8E9-93233865C080", "versionEndExcluding": "5.1.10", "versionStartIncluding": "5.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:*:*:*", "matchCriteriaId": "0793DC91-B6BE-4A19-B3DE-2E2113C59D31", "versionEndExcluding": "5.2.5", "versionStartIncluding": "5.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An improper link resolution before file access (\u0027link following\u0027) vulnerability exists in the Palo Alto Networks GlobalProtect app on Windows that enables a local attacker to disrupt system processes and potentially execute arbitrary code with SYSTEM privileges under certain circumstances. This issue impacts: GlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.10 on Windows. GlobalProtect app 5.2 versions earlier than GlobalProtect app 5.2.5 on Windows. This issue does not affect GlobalProtect app on other platforms." }, { "lang": "es", "value": "Se presenta una vulnerabilidad de resoluci\u00f3n de enlaces inapropiado antes del acceso a archivos (\"link following\") en GlobalProtect app de Palo Alto Networks en Windows que permite a un atacante local interrumpir los procesos del sistema y ejecutar potencialmente c\u00f3digo arbitrario con privilegios SYSTEM en determinadas circunstancias. Este problema afecta: GlobalProtect app versiones 5.1 anteriores a GlobalProtect app 5.1.10 en Windows. GlobalProtect app versiones 5.2 anteriores a GlobalProtect app 5.2.5 en Windows. Este problema no afecta a GlobalProtect app en otras plataformas" } ], "id": "CVE-2022-0017", "lastModified": "2024-11-21T06:37:49.577", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.0, "impactScore": 5.9, "source": "psirt@paloaltonetworks.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-02-10T18:15:08.563", "references": [ { "source": "psirt@paloaltonetworks.com", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2022-0017" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2022-0017" } ], "sourceIdentifier": "psirt@paloaltonetworks.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-59" } ], "source": "psirt@paloaltonetworks.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-59" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-02-10 18:15
Modified
2024-11-21 06:37
Severity ?
6.1 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
Summary
An information exposure vulnerability exists in the Palo Alto Networks GlobalProtect app on Windows and MacOS where the credentials of the local user account are sent to the GlobalProtect portal when the Single Sign-On feature is enabled in the GlobalProtect portal configuration. This product behavior is intentional and poses no security risk when connecting to trusted GlobalProtect portals configured to use the same Single Sign-On credentials both for the local user account as well as the GlobalProtect login. However when the credentials are different, the local account credentials are inadvertently sent to the GlobalProtect portal for authentication. A third party MITM type of attacker cannot see these credentials in transit. This vulnerability is a concern where the GlobalProtect app is deployed on Bring-your-Own-Device (BYOD) type of clients with private local user accounts or GlobalProtect app is used to connect to different organizations. Fixed versions of GlobalProtect app have an app setting to prevent the transmission of the user's local user credentials to the target GlobalProtect portal regardless of the portal configuration. This issue impacts: GlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.10 on Windows and MacOS; GlobalProtect app 5.2 versions earlier than GlobalProtect app 5.2.9 on Windows and MacOS This issue does not affect GlobalProtect app on other platforms.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@paloaltonetworks.com | https://security.paloaltonetworks.com/CVE-2022-0018 | Mitigation, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.paloaltonetworks.com/CVE-2022-0018 | Mitigation, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
paloaltonetworks | globalprotect | * | |
paloaltonetworks | globalprotect | * | |
apple | macos | - | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:*:*:*", "matchCriteriaId": "E84FC1F6-58F6-4C67-A8E9-93233865C080", "versionEndExcluding": "5.1.10", "versionStartIncluding": "5.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:*:*:*", "matchCriteriaId": "84B6241D-4456-4DC4-9767-3E608BCA0972", "versionEndExcluding": "5.2.9", "versionStartIncluding": "5.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An information exposure vulnerability exists in the Palo Alto Networks GlobalProtect app on Windows and MacOS where the credentials of the local user account are sent to the GlobalProtect portal when the Single Sign-On feature is enabled in the GlobalProtect portal configuration. This product behavior is intentional and poses no security risk when connecting to trusted GlobalProtect portals configured to use the same Single Sign-On credentials both for the local user account as well as the GlobalProtect login. However when the credentials are different, the local account credentials are inadvertently sent to the GlobalProtect portal for authentication. A third party MITM type of attacker cannot see these credentials in transit. This vulnerability is a concern where the GlobalProtect app is deployed on Bring-your-Own-Device (BYOD) type of clients with private local user accounts or GlobalProtect app is used to connect to different organizations. Fixed versions of GlobalProtect app have an app setting to prevent the transmission of the user\u0027s local user credentials to the target GlobalProtect portal regardless of the portal configuration. This issue impacts: GlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.10 on Windows and MacOS; GlobalProtect app 5.2 versions earlier than GlobalProtect app 5.2.9 on Windows and MacOS This issue does not affect GlobalProtect app on other platforms." }, { "lang": "es", "value": "Se presenta una vulnerabilidad de exposici\u00f3n de informaci\u00f3n en GlobalProtect app de Palo Alto Networks en Windows y MacOS en la que las credenciales de la cuenta de usuario local son enviadas al portal de GlobalProtect cuando la funci\u00f3n de inicio de sesi\u00f3n \u00fanico est\u00e1 habilitada en la configuraci\u00f3n del portal de GlobalProtect. Este comportamiento del producto es intencionado y no supone ning\u00fan riesgo de seguridad cuando es conectado a portales de GlobalProtect confiables configurados para usar las mismas credenciales de inicio de sesi\u00f3n \u00fanico tanto para la cuenta de usuario local como para el inicio de sesi\u00f3n de GlobalProtect. Sin embargo, cuando las credenciales son diferentes, las credenciales de la cuenta local son enviadas inadvertidamente al portal de GlobalProtect para la autenticaci\u00f3n. Un atacante de tipo MITM de terceros no puede visualizar estas credenciales en tr\u00e1nsito. Esta vulnerabilidad es un problema cuando GlobalProtect app es implementada en clientes del tipo Bring-your-Own-Device (BYOD) con cuentas de usuario locales privadas o GlobalProtect app es usada para conectarse a diferentes organizaciones. Las versiones corregidas de GlobalProtect app presentan una configuraci\u00f3n de la aplicaci\u00f3n para evitar la transmisi\u00f3n de las credenciales de usuario locales del usuario al portal GlobalProtect de destino, independientemente de la configuraci\u00f3n del portal. Este problema afecta: GlobalProtect app versiones 5.1 versiones anteriores a GlobalProtect app 5.1.10 en Windows y MacOS; GlobalProtect app 5.2 versiones anteriores a GlobalProtect app 5.2.9 en Windows y MacOS Este problema no afecta a GlobalProtect app en otras plataformas" } ], "id": "CVE-2022-0018", "lastModified": "2024-11-21T06:37:49.727", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 4.0, "source": "psirt@paloaltonetworks.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-02-10T18:15:08.627", "references": [ { "source": "psirt@paloaltonetworks.com", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2022-0018" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2022-0018" } ], "sourceIdentifier": "psirt@paloaltonetworks.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-201" } ], "source": "psirt@paloaltonetworks.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-02-10 18:15
Modified
2024-11-21 06:37
Severity ?
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
An information exposure through log file vulnerability exists in the Palo Alto Networks GlobalProtect app on Windows that logs the cleartext credentials of the connecting GlobalProtect user when authenticating using Connect Before Logon feature. This issue impacts GlobalProtect App 5.2 versions earlier than 5.2.9 on Windows. This issue does not affect the GlobalProtect app on other platforms.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
paloaltonetworks | globalprotect | * | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:*:*:*", "matchCriteriaId": "84B6241D-4456-4DC4-9767-3E608BCA0972", "versionEndExcluding": "5.2.9", "versionStartIncluding": "5.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An information exposure through log file vulnerability exists in the Palo Alto Networks GlobalProtect app on Windows that logs the cleartext credentials of the connecting GlobalProtect user when authenticating using Connect Before Logon feature. This issue impacts GlobalProtect App 5.2 versions earlier than 5.2.9 on Windows. This issue does not affect the GlobalProtect app on other platforms." }, { "lang": "es", "value": "Se presenta una vulnerabilidad de exposici\u00f3n de informaci\u00f3n mediante archivos de registro en GlobalProtect app de Palo Alto Networks en Windows que registra las credenciales en texto sin cifrar del usuario de GlobalProtect que es conectado cuando es autenticado usando la funci\u00f3n Connect Before Logon. Este problema afecta a GlobalProtect App versiones 5.2 anteriores a 5.2.9 en Windows. Este problema no afecta a GlobalProtect app en otras plataformas" } ], "id": "CVE-2022-0021", "lastModified": "2024-11-21T06:37:50.133", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "psirt@paloaltonetworks.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-02-10T18:15:08.803", "references": [ { "source": "psirt@paloaltonetworks.com", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2022-0021" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2022-0021" } ], "sourceIdentifier": "psirt@paloaltonetworks.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-532" } ], "source": "psirt@paloaltonetworks.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-532" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-10-13 16:15
Modified
2024-11-21 06:20
Severity ?
Summary
A stack-based buffer overflow vulnerability exists in the Palo Alto Networks GlobalProtect app that enables a man-in-the-middle attacker to disrupt system processes and potentially execute arbitrary code with SYSTEM privileges. This issue impacts: GlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.9 on Windows; GlobalProtect app 5.2 versions earlier than GlobalProtect app 5.2.8 on Windows; GlobalProtect app 5.2 versions earlier than GlobalProtect app 5.2.8 on the Universal Windows Platform; GlobalProtect app 5.3 versions earlier than GlobalProtect app 5.3.1 on Linux.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:linux:*:*", "matchCriteriaId": "27A40339-3816-4979-9705-2BA65C4485A3", "versionEndIncluding": "5.0.8", "versionStartIncluding": "5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:macos:*:*", "matchCriteriaId": "135DF658-334F-488A-AF89-F6655F55553A", "versionEndIncluding": "5.0.9", "versionStartIncluding": "5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:windows:*:*", "matchCriteriaId": "0E7CFF6E-3351-4E89-9CAA-FDE41CCF6C4F", "versionEndIncluding": "5.0.10", "versionStartIncluding": "5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:linux:*:*", "matchCriteriaId": "4658EFFB-74B9-4EE1-9044-060A109366A5", "versionEndIncluding": "5.1.1", "versionStartIncluding": "5.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:universal_windows_platform:*:*", "matchCriteriaId": "511996AA-C9AE-4B0B-8A95-3A6ABECC89A1", "versionEndIncluding": "5.1.1", "versionStartIncluding": "5.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:windows:*:*", "matchCriteriaId": "83122FE0-55DC-4060-B553-4F7C45192ABF", "versionEndExcluding": "5.1.9", "versionStartIncluding": "5.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:macos:*:*", "matchCriteriaId": "1FD9AB74-21E7-4822-A16F-A23AA110B262", "versionEndIncluding": "5.1.4", "versionStartIncluding": "5.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:linux:*:*", "matchCriteriaId": "DDF7AE8D-C8B9-4B72-AF3E-2E5B80234A86", "versionEndExcluding": "5.2.8", "versionStartIncluding": "5.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:macos:*:*", "matchCriteriaId": "E4C4A15B-CCEB-4663-9836-B11D13CA03B9", "versionEndExcluding": "5.2.8", "versionStartIncluding": "5.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:universal_windows_platform:*:*", "matchCriteriaId": "C099E60F-55FE-4A36-88FC-C84E6B46E752", "versionEndExcluding": "5.2.8", "versionStartIncluding": "5.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:windows:*:*", "matchCriteriaId": "694EFE3E-296B-4466-9391-C3577BC9FEE8", "versionEndExcluding": "5.2.8", "versionStartIncluding": "5.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:linux:*:*", "matchCriteriaId": "DAD2A294-98F8-4468-9AF0-8B18FCCC49C2", "versionEndExcluding": "5.3.1", "versionStartIncluding": "5.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:5.0:*:*:*:*:universal_windows_platform:*:*", "matchCriteriaId": "89A946DF-8E7B-41A7-A63F-E9F22D57C041", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A stack-based buffer overflow vulnerability exists in the Palo Alto Networks GlobalProtect app that enables a man-in-the-middle attacker to disrupt system processes and potentially execute arbitrary code with SYSTEM privileges. This issue impacts: GlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.9 on Windows; GlobalProtect app 5.2 versions earlier than GlobalProtect app 5.2.8 on Windows; GlobalProtect app 5.2 versions earlier than GlobalProtect app 5.2.8 on the Universal Windows Platform; GlobalProtect app 5.3 versions earlier than GlobalProtect app 5.3.1 on Linux." }, { "lang": "es", "value": "Se presenta una vulnerabilidad de desbordamiento del b\u00fafer en la regi\u00f3n stack de la memoria en Palo Alto Networks GlobalProtect app que permite a un atacante que act\u00faa como intermediario interrumpir los procesos del sistema y ejecutar potencialmente c\u00f3digo arbitrario con privilegios SYSTEM. Este problema afecta: GlobalProtect app 5.1 versiones anteriores a GlobalProtect app 5.1.9 en Windows; GlobalProtect app 5.2 versiones anteriores a GlobalProtect app 5.2.8 en Windows; GlobalProtect app 5.2 versiones anteriores a GlobalProtect app 5.2.8 en la Plataforma Universal Windows; GlobalProtect app 5.3 versiones anteriores a GlobalProtect app 5.3.1 en Linux" } ], "id": "CVE-2021-3057", "lastModified": "2024-11-21T06:20:52.090", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "psirt@paloaltonetworks.com", "type": "Secondary" } ] }, "published": "2021-10-13T16:15:07.783", "references": [ { "source": "psirt@paloaltonetworks.com", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2021-3057" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2021-3057" } ], "sourceIdentifier": "psirt@paloaltonetworks.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-121" } ], "source": "psirt@paloaltonetworks.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-02-10 18:15
Modified
2024-11-21 06:37
Severity ?
7.4 (High) - CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
An improper handling of exceptional conditions vulnerability exists within the Connect Before Logon feature of the Palo Alto Networks GlobalProtect app that enables a local attacker to escalate to SYSTEM or root privileges when authenticating with Connect Before Logon under certain circumstances. This issue impacts GlobalProtect app 5.2 versions earlier than GlobalProtect app 5.2.9 on Windows and MacOS. This issue does not affect the GlobalProtect app on other platforms.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
paloaltonetworks | globalprotect | * | |
apple | macos | - | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:*:*:*", "matchCriteriaId": "84B6241D-4456-4DC4-9767-3E608BCA0972", "versionEndExcluding": "5.2.9", "versionStartIncluding": "5.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An improper handling of exceptional conditions vulnerability exists within the Connect Before Logon feature of the Palo Alto Networks GlobalProtect app that enables a local attacker to escalate to SYSTEM or root privileges when authenticating with Connect Before Logon under certain circumstances. This issue impacts GlobalProtect app 5.2 versions earlier than GlobalProtect app 5.2.9 on Windows and MacOS. This issue does not affect the GlobalProtect app on other platforms." }, { "lang": "es", "value": "Se presenta una vulnerabilidad de manejo inapropiado de condiciones excepcionales en la funcionalidad Connect Before Logon de GlobalProtect app de Palo Alto Networks que permite a un atacante local escalar a privilegios SYSTEM o root cuando es autenticado con Connect Before Logon en determinadas circunstancias. Este problema afecta a GlobalProtect app versiones 5.2 anteriores a 5.2.9 en Windows y MacOS. Este problema no afecta a GlobalProtect app en otras plataformas" } ], "id": "CVE-2022-0016", "lastModified": "2024-11-21T06:37:49.420", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.4, "impactScore": 5.9, "source": "psirt@paloaltonetworks.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-02-10T18:15:08.503", "references": [ { "source": "psirt@paloaltonetworks.com", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2022-0016" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2022-0016" } ], "sourceIdentifier": "psirt@paloaltonetworks.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-703" } ], "source": "psirt@paloaltonetworks.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-755" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-04-20 04:15
Modified
2024-11-21 06:20
Severity ?
Summary
A denial-of-service (DoS) vulnerability in Palo Alto Networks GlobalProtect app on Windows systems allows a limited Windows user to send specifically-crafted input to the GlobalProtect app that results in a Windows blue screen of death (BSOD) error. This issue impacts: GlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.8; GlobalProtect app 5.2 versions earlier than GlobalProtect app 5.2.4.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
paloaltonetworks | globalprotect | * | |
paloaltonetworks | globalprotect | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:windows:*:*", "matchCriteriaId": "F9DF37EB-CA9A-43AF-9291-9DE99330E9AC", "versionEndExcluding": "5.1.8", "versionStartIncluding": "5.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:windows:*:*", "matchCriteriaId": "DD74EA32-59A1-41A3-9445-E886CA324C5A", "versionEndExcluding": "5.2.4", "versionStartIncluding": "5.2.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A denial-of-service (DoS) vulnerability in Palo Alto Networks GlobalProtect app on Windows systems allows a limited Windows user to send specifically-crafted input to the GlobalProtect app that results in a Windows blue screen of death (BSOD) error. This issue impacts: GlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.8; GlobalProtect app 5.2 versions earlier than GlobalProtect app 5.2.4." }, { "lang": "es", "value": "Una vulnerabilidad de denegaci\u00f3n de servicio (DoS) en la aplicaci\u00f3n Palo Alto Networks GlobalProtect en sistemas Windows, permite a un usuario limitado de Windows enviar informaci\u00f3n espec\u00edficamente dise\u00f1ada a la aplicaci\u00f3n GlobalProtect que resulta en un error de pantalla azul de finalizaci\u00f3n (BSOD) de Windows.\u0026#xa0;Este problema afecta a: la aplicaci\u00f3n GlobalProtect versiones 5.1 anteriores a la aplicaci\u00f3n GlobalProtect versi\u00f3n 5.1.8;\u0026#xa0;la aplicaci\u00f3n GlobalProtect versiones 5.2 anteriores a la aplicaci\u00f3n GlobalProtect versi\u00f3n 5.2.4" } ], "id": "CVE-2021-3038", "lastModified": "2024-11-21T06:20:48.850", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "psirt@paloaltonetworks.com", "type": "Secondary" } ] }, "published": "2021-04-20T04:15:12.840", "references": [ { "source": "psirt@paloaltonetworks.com", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2021-3038" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2021-3038" } ], "sourceIdentifier": "psirt@paloaltonetworks.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" }, { "lang": "en", "value": "CWE-248" } ], "source": "psirt@paloaltonetworks.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-10-16 19:15
Modified
2024-11-21 04:32
Severity ?
Summary
A Local Privilege Escalation vulnerability exists in GlobalProtect Agent for Linux and Mac OS X version 5.0.4 and earlier and version 4.1.12 and earlier, that can allow non-root users to overwrite root files on the file system.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
paloaltonetworks | globalprotect | * | |
paloaltonetworks | globalprotect | * | |
paloaltonetworks | globalprotect | * | |
paloaltonetworks | globalprotect | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:linux:*:*", "matchCriteriaId": "023DE226-3A76-4091-86E8-92769D0E8C04", "versionEndIncluding": "5.0.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:macos:*:*", "matchCriteriaId": "E92EBACF-FF42-41B2-9F47-BA23B217597D", "versionEndIncluding": "5.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:linux:*:*", "matchCriteriaId": "7008BF42-BC98-4B0D-80E7-BF0CDA66529F", "versionEndIncluding": "4.1.12", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:macos:*:*", "matchCriteriaId": "9B9A0B22-4E32-4A69-A6A9-E6EC02628210", "versionEndIncluding": "4.1.12", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Local Privilege Escalation vulnerability exists in GlobalProtect Agent for Linux and Mac OS X version 5.0.4 and earlier and version 4.1.12 and earlier, that can allow non-root users to overwrite root files on the file system." }, { "lang": "es", "value": "Se presenta una vulnerabilidad de Escalada de Privilegios Local en GlobalProtect Agent para Linux y Mac OS X versi\u00f3n 5.0.4 y anteriores y versi\u00f3n 4.1.12 y anteriores, lo que puede permitir que los usuarios no root sobrescriban los archivos root en el sistema de archivos." } ], "id": "CVE-2019-17436", "lastModified": "2024-11-21T04:32:19.660", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.6, "confidentialityImpact": "NONE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 9.2, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-10-16T19:15:16.067", "references": [ { "source": "psirt@paloaltonetworks.com", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2019-17436" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2019-17436" } ], "sourceIdentifier": "psirt@paloaltonetworks.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-08-31 17:55
Modified
2024-11-21 01:46
Severity ?
Summary
Palo Alto Networks GlobalProtect before 1.1.7, and NetConnect, does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof portal servers and obtain sensitive information via a crafted certificate.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
paloaltonetworks | globalprotect | * | |
paloaltonetworks | netconnect | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:*:*:*", "matchCriteriaId": "4284E6A8-FF22-42FD-9EE1-920556EBBADF", "versionEndIncluding": "1.1.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:netconnect:-:*:*:*:*:*:*:*", "matchCriteriaId": "85F0D3B2-A763-4DF5-9484-FCAABCF6D041", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Palo Alto Networks GlobalProtect before 1.1.7, and NetConnect, does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof portal servers and obtain sensitive information via a crafted certificate." }, { "lang": "es", "value": "Palo Alto Networks GlobalProtect anterior a 1.1.7 y NetConnect, no verifican los certificados X.509 desde los servidores SSL, lo que permite a atacantes man-in-the-middle suplantar a servidores y obtener informaci\u00f3n sensible a trav\u00e9s de un certificado manipulado." } ], "id": "CVE-2012-6606", "lastModified": "2024-11-21T01:46:29.230", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-08-31T17:55:03.527", "references": [ { "source": "cve@mitre.org", "url": "http://archives.neohapsis.com/archives/bugtraq/2012-10/0100.html" }, { "source": "cve@mitre.org", "url": "https://security.paloaltonetworks.com/CVE-2012-6606" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.neohapsis.com/archives/bugtraq/2012-10/0100.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.paloaltonetworks.com/CVE-2012-6606" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-310" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-04-12 17:15
Modified
2024-11-21 07:36
Severity ?
6.3 (Medium) - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
6.3 (Medium) - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
6.3 (Medium) - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
Summary
A local file deletion vulnerability in the Palo Alto Networks GlobalProtect app on Windows devices enables a user to delete system files from the endpoint with elevated privileges through a race condition.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
paloaltonetworks | globalprotect | * | |
paloaltonetworks | globalprotect | * | |
paloaltonetworks | globalprotect | 6.1.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:windows:*:*", "matchCriteriaId": "5BEA67AB-65F5-4243-BF0C-3144FCD3A8DB", "versionEndExcluding": "5.2.13", "versionStartIncluding": "5.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:windows:*:*", "matchCriteriaId": "654DD13D-FF8F-468C-A98A-7BD81FEEFB6A", "versionEndExcluding": "6.0.4", "versionStartIncluding": "6.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:6.1.0:*:*:*:*:windows:*:*", "matchCriteriaId": "4ED230C2-F7FC-4CEF-BBBC-E44A68A1ADDA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A local file deletion vulnerability in the Palo Alto Networks GlobalProtect app on Windows devices enables a user to delete system files from the endpoint with elevated privileges through a race condition." } ], "id": "CVE-2023-0006", "lastModified": "2024-11-21T07:36:22.747", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.0, "impactScore": 5.2, "source": "psirt@paloaltonetworks.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.0, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-04-12T17:15:07.283", "references": [ { "source": "psirt@paloaltonetworks.com", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2023-0006" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2023-0006" } ], "sourceIdentifier": "psirt@paloaltonetworks.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-367" } ], "source": "psirt@paloaltonetworks.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-367" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }