CVE-2020-2032 – GlobalProtect App: File race condition vulnerability leads to local privilege escalation during upgrade
https://notcve.org/view.php?id=CVE-2020-2032
A race condition vulnerability Palo Alto Networks GlobalProtect app on Windows allows a local limited Windows user to execute programs with SYSTEM privileges. This issue can be exploited only while performing a GlobalProtect app upgrade. This issue affects: GlobalProtect app 5.0 versions earlier than GlobalProtect app 5.0.10 on Windows; GlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.4 on Windows. Una vulnerabilidad de condición de carrera en la aplicación GlobalProtect de Palo Alto Networks en Windows, permite a un usuario local limitado de Windows ejecutar programas con privilegios SYSTEM. Este problema solo puede ser explotado mientras se realiza una actualización de la aplicación GlobalProtect. • https://security.paloaltonetworks.com/CVE-2020-2032 • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •
CVE-2020-2004 – GlobalProtect App: Passwords may be logged in clear text while collecting troubleshooting logs
https://notcve.org/view.php?id=CVE-2020-2004
Under certain circumstances a user's password may be logged in cleartext in the PanGPS.log diagnostic file when logs are collected for troubleshooting on GlobalProtect app (also known as GlobalProtect Agent) for MacOS and Windows. For this issue to occur all of these conditions must be true: (1) 'Save User Credential' option should be set to 'Yes' in the GlobalProtect Portal's Agent configuration, (2) the GlobalProtect user manually selects a gateway, (3) and the logging level is set to 'Dump' while collecting troubleshooting logs. This issue does not affect GlobalProtect app on other platforms (for example iOS/Android/Linux). This issue affects GlobalProtect app 5.0 versions earlier than 5.0.9, GlobalProtect app 5.1 versions earlier than 5.1.2 on Windows or MacOS. Since becoming aware of the issue, Palo Alto Networks has safely deleted all the known GlobalProtectLogs zip files sent by customers with the credentials. • https://security.paloaltonetworks.com/CVE-2020-2004 • CWE-532: Insertion of Sensitive Information into Log File CWE-534: DEPRECATED: Information Exposure Through Debug Log Files •
CVE-2020-1989 – Global Protect Agent: Incorrect privilege assignment allows local privilege escalation
https://notcve.org/view.php?id=CVE-2020-1989
An incorrect privilege assignment vulnerability when writing application-specific files in the Palo Alto Networks Global Protect Agent for Linux on ARM platform allows a local authenticated user to gain root privileges on the system. This issue affects Palo Alto Networks Global Protect Agent for Linux 5.0 versions before 5.0.8; 5.1 versions before 5.1.1. Una vulnerabilidad de asignación de privilegios incorrecta cuando se escriben archivos específicos de la aplicación en el Global Protect Agent de Palo Alto Networks para Linux en la plataforma ARM, permite a un usuario autenticado local alcanzar privilegios root sobre el sistema. Este problema afecta al Global Protect Agent de Palo Alto Networks para Linux versiones 5.0 anteriores a 5.0.8; versiones 5.1 anteriores a 5.1.1. • https://security.paloaltonetworks.com/CVE-2020-1989 • CWE-266: Incorrect Privilege Assignment CWE-269: Improper Privilege Management •
CVE-2020-1988 – Global Protect Agent: Local privilege escalation due to an unquoted search path vulnerability
https://notcve.org/view.php?id=CVE-2020-1988
An unquoted search path vulnerability in the Windows release of Global Protect Agent allows an authenticated local user with file creation privileges on the root of the OS disk (C:\) or to Program Files directory to gain system privileges. This issue affects Palo Alto Networks GlobalProtect Agent 5.0 versions before 5.0.5; 4.1 versions before 4.1.13 on Windows; Una vulnerabilidad de ruta de búsqueda sin comillas en la versión de Windows del Global Protect Agent, permite a un usuario local autenticado con privilegios de creación de archivos en la root del disco del Sistema Operativo (C:\) o al directorio Program Files para alcanzar privilegios system. Este problema afecta a Global Protect Agent de Palo Alto Networks versiones 5.0 anteriores a 5.0.5; versiones 4.1 anteriores a 4.1.13 en Windows; • https://security.paloaltonetworks.com/CVE-2020-1988 • CWE-428: Unquoted Search Path or Element •
CVE-2020-1987 – Global Protect Agent: VPN cookie local information disclosure
https://notcve.org/view.php?id=CVE-2020-1987
An information exposure vulnerability in the logging component of Palo Alto Networks Global Protect Agent allows a local authenticated user to read VPN cookie information when the troubleshooting logging level is set to "Dump". This issue affects Palo Alto Networks Global Protect Agent 5.0 versions prior to 5.0.9; 5.1 versions prior to 5.1.1. Una vulnerabilidad de exposición de información en el componente logging del Global Protect Agent de Palo Alto Networks, permite a un usuario autenticado local leer información de la cookie VPN cuando el nivel de registro de solución de problemas se establece en "Dump". Este problema afecta a Palo Alto Networks versiones 5.0 anteriores a 5.0.9; 5.1 versiones anteriores a 5.1.1. • https://security.paloaltonetworks.com/CVE-2020-1987 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-532: Insertion of Sensitive Information into Log File •