CVE-2022-0017 – GlobalProtect App: Improper Link Resolution Vulnerability Leads to Local Privilege Escalation
https://notcve.org/view.php?id=CVE-2022-0017
An improper link resolution before file access ('link following') vulnerability exists in the Palo Alto Networks GlobalProtect app on Windows that enables a local attacker to disrupt system processes and potentially execute arbitrary code with SYSTEM privileges under certain circumstances. This issue impacts: GlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.10 on Windows. GlobalProtect app 5.2 versions earlier than GlobalProtect app 5.2.5 on Windows. This issue does not affect GlobalProtect app on other platforms. Se presenta una vulnerabilidad de resolución de enlaces inapropiado antes del acceso a archivos ("link following") en GlobalProtect app de Palo Alto Networks en Windows que permite a un atacante local interrumpir los procesos del sistema y ejecutar potencialmente código arbitrario con privilegios SYSTEM en determinadas circunstancias. • https://security.paloaltonetworks.com/CVE-2022-0017 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •
CVE-2022-0016 – GlobalProtect App: Privilege Escalation Vulnerability When Using Connect Before Logon
https://notcve.org/view.php?id=CVE-2022-0016
An improper handling of exceptional conditions vulnerability exists within the Connect Before Logon feature of the Palo Alto Networks GlobalProtect app that enables a local attacker to escalate to SYSTEM or root privileges when authenticating with Connect Before Logon under certain circumstances. This issue impacts GlobalProtect app 5.2 versions earlier than GlobalProtect app 5.2.9 on Windows and MacOS. This issue does not affect the GlobalProtect app on other platforms. Se presenta una vulnerabilidad de manejo inapropiado de condiciones excepcionales en la funcionalidad Connect Before Logon de GlobalProtect app de Palo Alto Networks que permite a un atacante local escalar a privilegios SYSTEM o root cuando es autenticado con Connect Before Logon en determinadas circunstancias. Este problema afecta a GlobalProtect app versiones 5.2 anteriores a 5.2.9 en Windows y MacOS. • https://security.paloaltonetworks.com/CVE-2022-0016 • CWE-703: Improper Check or Handling of Exceptional Conditions CWE-755: Improper Handling of Exceptional Conditions •
CVE-2021-3057 – GlobalProtect App: Buffer Overflow Vulnerability When Connecting to Portal or Gateway
https://notcve.org/view.php?id=CVE-2021-3057
A stack-based buffer overflow vulnerability exists in the Palo Alto Networks GlobalProtect app that enables a man-in-the-middle attacker to disrupt system processes and potentially execute arbitrary code with SYSTEM privileges. This issue impacts: GlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.9 on Windows; GlobalProtect app 5.2 versions earlier than GlobalProtect app 5.2.8 on Windows; GlobalProtect app 5.2 versions earlier than GlobalProtect app 5.2.8 on the Universal Windows Platform; GlobalProtect app 5.3 versions earlier than GlobalProtect app 5.3.1 on Linux. Se presenta una vulnerabilidad de desbordamiento del búfer en la región stack de la memoria en Palo Alto Networks GlobalProtect app que permite a un atacante que actúa como intermediario interrumpir los procesos del sistema y ejecutar potencialmente código arbitrario con privilegios SYSTEM. Este problema afecta: GlobalProtect app 5.1 versiones anteriores a GlobalProtect app 5.1.9 en Windows; GlobalProtect app 5.2 versiones anteriores a GlobalProtect app 5.2.8 en Windows; GlobalProtect app 5.2 versiones anteriores a GlobalProtect app 5.2.8 en la Plataforma Universal Windows; GlobalProtect app 5.3 versiones anteriores a GlobalProtect app 5.3.1 en Linux • https://security.paloaltonetworks.com/CVE-2021-3057 • CWE-121: Stack-based Buffer Overflow CWE-787: Out-of-bounds Write •
CVE-2021-3038 – GlobalProtect App: Windows VPN kernel driver denial of service (DoS)
https://notcve.org/view.php?id=CVE-2021-3038
A denial-of-service (DoS) vulnerability in Palo Alto Networks GlobalProtect app on Windows systems allows a limited Windows user to send specifically-crafted input to the GlobalProtect app that results in a Windows blue screen of death (BSOD) error. This issue impacts: GlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.8; GlobalProtect app 5.2 versions earlier than GlobalProtect app 5.2.4. Una vulnerabilidad de denegación de servicio (DoS) en la aplicación Palo Alto Networks GlobalProtect en sistemas Windows, permite a un usuario limitado de Windows enviar información específicamente diseñada a la aplicación GlobalProtect que resulta en un error de pantalla azul de finalización (BSOD) de Windows. Este problema afecta a: la aplicación GlobalProtect versiones 5.1 anteriores a la aplicación GlobalProtect versión 5.1.8; la aplicación GlobalProtect versiones 5.2 anteriores a la aplicación GlobalProtect versión 5.2.4 • https://security.paloaltonetworks.com/CVE-2021-3038 • CWE-20: Improper Input Validation CWE-248: Uncaught Exception •
CVE-2020-2033 – GlobalProtect App: Missing certificate validation vulnerability can disclose pre-logon authentication cookie
https://notcve.org/view.php?id=CVE-2020-2033
When the pre-logon feature is enabled, a missing certification validation in Palo Alto Networks GlobalProtect app can disclose the pre-logon authentication cookie to a man-in-the-middle attacker on the same local area network segment with the ability to manipulate ARP or to conduct ARP spoofing attacks. This allows the attacker to access the GlobalProtect Server as allowed by configured Security rules for the 'pre-login' user. This access may be limited compared to the network access of regular users. This issue affects: GlobalProtect app 5.0 versions earlier than GlobalProtect app 5.0.10 when the prelogon feature is enabled; GlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.4 when the prelogon feature is enabled. Cuando la funcionalidad pre-logon está habilitada, una falta de comprobación de certificación en la aplicación GlobalProtect de Palo Alto Networks puede revelar la cookie de autenticación de pre-logon a un atacante de tipo man-in-the-middle en el mismo segmento de red de área local con la capacidad de manipular ARP o conducir ataques de suplantación de identidad de ARP. • https://security.paloaltonetworks.com/CVE-2020-2033 • CWE-290: Authentication Bypass by Spoofing CWE-295: Improper Certificate Validation •