Page 2 of 11 results (0.020 seconds)

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 0

A denial-of-service (DoS) vulnerability in Palo Alto Networks GlobalProtect app on Windows systems allows a limited Windows user to send specifically-crafted input to the GlobalProtect app that results in a Windows blue screen of death (BSOD) error. This issue impacts: GlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.8; GlobalProtect app 5.2 versions earlier than GlobalProtect app 5.2.4. Una vulnerabilidad de denegación de servicio (DoS) en la aplicación Palo Alto Networks GlobalProtect en sistemas Windows, permite a un usuario limitado de Windows enviar información específicamente diseñada a la aplicación GlobalProtect que resulta en un error de pantalla azul de finalización (BSOD) de Windows. Este problema afecta a: la aplicación GlobalProtect versiones 5.1 anteriores a la aplicación GlobalProtect versión 5.1.8; la aplicación GlobalProtect versiones 5.2 anteriores a la aplicación GlobalProtect versión 5.2.4 • https://security.paloaltonetworks.com/CVE-2021-3038 • CWE-20: Improper Input Validation CWE-248: Uncaught Exception •

CVSS: 5.3EPSS: 0%CPEs: 2EXPL: 0

When the pre-logon feature is enabled, a missing certification validation in Palo Alto Networks GlobalProtect app can disclose the pre-logon authentication cookie to a man-in-the-middle attacker on the same local area network segment with the ability to manipulate ARP or to conduct ARP spoofing attacks. This allows the attacker to access the GlobalProtect Server as allowed by configured Security rules for the 'pre-login' user. This access may be limited compared to the network access of regular users. This issue affects: GlobalProtect app 5.0 versions earlier than GlobalProtect app 5.0.10 when the prelogon feature is enabled; GlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.4 when the prelogon feature is enabled. Cuando la funcionalidad pre-logon está habilitada, una falta de comprobación de certificación en la aplicación GlobalProtect de Palo Alto Networks puede revelar la cookie de autenticación de pre-logon a un atacante de tipo man-in-the-middle en el mismo segmento de red de área local con la capacidad de manipular ARP o conducir ataques de suplantación de identidad de ARP. • https://security.paloaltonetworks.com/CVE-2020-2033 • CWE-290: Authentication Bypass by Spoofing CWE-295: Improper Certificate Validation •

CVSS: 7.0EPSS: 0%CPEs: 2EXPL: 0

A race condition vulnerability Palo Alto Networks GlobalProtect app on Windows allows a local limited Windows user to execute programs with SYSTEM privileges. This issue can be exploited only while performing a GlobalProtect app upgrade. This issue affects: GlobalProtect app 5.0 versions earlier than GlobalProtect app 5.0.10 on Windows; GlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.4 on Windows. Una vulnerabilidad de condición de carrera en la aplicación GlobalProtect de Palo Alto Networks en Windows, permite a un usuario local limitado de Windows ejecutar programas con privilegios SYSTEM. Este problema solo puede ser explotado mientras se realiza una actualización de la aplicación GlobalProtect. • https://security.paloaltonetworks.com/CVE-2020-2032 • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •

CVSS: 6.8EPSS: 0%CPEs: 4EXPL: 0

Under certain circumstances a user's password may be logged in cleartext in the PanGPS.log diagnostic file when logs are collected for troubleshooting on GlobalProtect app (also known as GlobalProtect Agent) for MacOS and Windows. For this issue to occur all of these conditions must be true: (1) 'Save User Credential' option should be set to 'Yes' in the GlobalProtect Portal's Agent configuration, (2) the GlobalProtect user manually selects a gateway, (3) and the logging level is set to 'Dump' while collecting troubleshooting logs. This issue does not affect GlobalProtect app on other platforms (for example iOS/Android/Linux). This issue affects GlobalProtect app 5.0 versions earlier than 5.0.9, GlobalProtect app 5.1 versions earlier than 5.1.2 on Windows or MacOS. Since becoming aware of the issue, Palo Alto Networks has safely deleted all the known GlobalProtectLogs zip files sent by customers with the credentials. • https://security.paloaltonetworks.com/CVE-2020-2004 • CWE-532: Insertion of Sensitive Information into Log File CWE-534: DEPRECATED: Information Exposure Through Debug Log Files •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

An incorrect privilege assignment vulnerability when writing application-specific files in the Palo Alto Networks Global Protect Agent for Linux on ARM platform allows a local authenticated user to gain root privileges on the system. This issue affects Palo Alto Networks Global Protect Agent for Linux 5.0 versions before 5.0.8; 5.1 versions before 5.1.1. Una vulnerabilidad de asignación de privilegios incorrecta cuando se escriben archivos específicos de la aplicación en el Global Protect Agent de Palo Alto Networks para Linux en la plataforma ARM, permite a un usuario autenticado local alcanzar privilegios root sobre el sistema. Este problema afecta al Global Protect Agent de Palo Alto Networks para Linux versiones 5.0 anteriores a 5.0.8; versiones 5.1 anteriores a 5.1.1. • https://security.paloaltonetworks.com/CVE-2020-1989 • CWE-266: Incorrect Privilege Assignment CWE-269: Improper Privilege Management •