
CVE-2022-0021 – GlobalProtect App: Information Exposure Vulnerability When Using Connect Before Logon
https://notcve.org/view.php?id=CVE-2022-0021
10 Feb 2022 — An information exposure through log file vulnerability exists in the Palo Alto Networks GlobalProtect app on Windows that logs the cleartext credentials of the connecting GlobalProtect user when authenticating using Connect Before Logon feature. This issue impacts GlobalProtect App 5.2 versions earlier than 5.2.9 on Windows. This issue does not affect the GlobalProtect app on other platforms. Se presenta una vulnerabilidad de exposición de información mediante archivos de registro en GlobalProtect app de Pa... • https://security.paloaltonetworks.com/CVE-2022-0021 • CWE-532: Insertion of Sensitive Information into Log File •

CVE-2022-0020 – Cortex XSOAR: Stored Cross-Site Scripting (XSS) Vulnerability in Web Interface
https://notcve.org/view.php?id=CVE-2022-0020
10 Feb 2022 — A stored cross-site scripting (XSS) vulnerability in Palo Alto Network Cortex XSOAR web interface enables an authenticated network-based attacker to store a persistent javascript payload that will perform arbitrary actions in the Cortex XSOAR web interface on behalf of authenticated administrators who encounter the payload during normal operations. This issue impacts: All builds of Cortex XSOAR 6.1.0; Cortex XSOAR 6.2.0 builds earlier than build 1958888. Una vulnerabilidad de tipo cross-site scripting (XSS)... • https://packetstorm.news/files/id/171782 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2022-0019 – GlobalProtect App: Insufficiently Protected Credentials Vulnerability on Linux
https://notcve.org/view.php?id=CVE-2022-0019
10 Feb 2022 — An insufficiently protected credentials vulnerability exists in the Palo Alto Networks GlobalProtect app on Linux that exposes the hashed credentials of GlobalProtect users that saved their password during previous GlobalProtect app sessions to other local users on the system. The exposed credentials enable a local attacker to authenticate to the GlobalProtect portal or gateway as the target user without knowing of the target user’s plaintext password. This issue impacts: GlobalProtect app 5.1 versions earl... • https://security.paloaltonetworks.com/CVE-2022-0019 • CWE-522: Insufficiently Protected Credentials •

CVE-2022-0018 – GlobalProtect App: Information Exposure Vulnerability When Connecting to GlobalProtect Portal With Single Sign-On Enabled
https://notcve.org/view.php?id=CVE-2022-0018
10 Feb 2022 — An information exposure vulnerability exists in the Palo Alto Networks GlobalProtect app on Windows and MacOS where the credentials of the local user account are sent to the GlobalProtect portal when the Single Sign-On feature is enabled in the GlobalProtect portal configuration. This product behavior is intentional and poses no security risk when connecting to trusted GlobalProtect portals configured to use the same Single Sign-On credentials both for the local user account as well as the GlobalProtect log... • https://security.paloaltonetworks.com/CVE-2022-0018 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-201: Insertion of Sensitive Information Into Sent Data •

CVE-2022-0017 – GlobalProtect App: Improper Link Resolution Vulnerability Leads to Local Privilege Escalation
https://notcve.org/view.php?id=CVE-2022-0017
10 Feb 2022 — An improper link resolution before file access ('link following') vulnerability exists in the Palo Alto Networks GlobalProtect app on Windows that enables a local attacker to disrupt system processes and potentially execute arbitrary code with SYSTEM privileges under certain circumstances. This issue impacts: GlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.10 on Windows. GlobalProtect app 5.2 versions earlier than GlobalProtect app 5.2.5 on Windows. This issue does not affect GlobalProtect... • https://security.paloaltonetworks.com/CVE-2022-0017 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVE-2022-0016 – GlobalProtect App: Privilege Escalation Vulnerability When Using Connect Before Logon
https://notcve.org/view.php?id=CVE-2022-0016
10 Feb 2022 — An improper handling of exceptional conditions vulnerability exists within the Connect Before Logon feature of the Palo Alto Networks GlobalProtect app that enables a local attacker to escalate to SYSTEM or root privileges when authenticating with Connect Before Logon under certain circumstances. This issue impacts GlobalProtect app 5.2 versions earlier than GlobalProtect app 5.2.9 on Windows and MacOS. This issue does not affect the GlobalProtect app on other platforms. Se presenta una vulnerabilidad de ma... • https://security.paloaltonetworks.com/CVE-2022-0016 • CWE-703: Improper Check or Handling of Exceptional Conditions CWE-755: Improper Handling of Exceptional Conditions •

CVE-2022-0011 – PAN-OS: URL Category Exceptions Match More URLs Than Intended in URL Filtering
https://notcve.org/view.php?id=CVE-2022-0011
10 Feb 2022 — PAN-OS software provides options to exclude specific websites from URL category enforcement and those websites are blocked or allowed (depending on your rules) regardless of their associated URL category. This is done by creating a custom URL category list or by using an external dynamic list (EDL) in a URL Filtering profile. When the entries in these lists have a hostname pattern that does not end with a forward slash (/) or a hostname pattern that ends with an asterisk (*), any URL that starts with the sp... • https://security.paloaltonetworks.com/CVE-2022-0011 • CWE-436: Interpretation Conflict •

CVE-2022-0015 – Cortex XDR Agent: An Uncontrolled Search Path Element Leads to Local Privilege Escalation (PE) Vulnerability
https://notcve.org/view.php?id=CVE-2022-0015
12 Jan 2022 — A local privilege escalation (PE) vulnerability exists in the Palo Alto Networks Cortex XDR agent that enables an authenticated local user to execute programs with elevated privileges. This issue impacts: Cortex XDR agent 5.0 versions earlier than Cortex XDR agent 5.0.12; Cortex XDR agent 6.1 versions earlier than Cortex XDR agent 6.1.9. Se presenta una vulnerabilidad de escalada de privilegios (PE) local en el agente Cortex XDR de Palo Alto Networks que permite a un usuario local autenticado ejecutar progr... • https://security.paloaltonetworks.com/CVE-2022-0015 • CWE-427: Uncontrolled Search Path Element •

CVE-2022-0014 – Cortex XDR Agent: Unintended Program Execution When Using Live Terminal Session
https://notcve.org/view.php?id=CVE-2022-0014
12 Jan 2022 — An untrusted search path vulnerability exists in the Palo Alto Networks Cortex XDR agent that enables a local attacker with file creation privilege in the Windows root directory (such as C:\) to store a program that can then be unintentionally executed by another local user when that user utilizes a Live Terminal session. This issue impacts: Cortex XDR agent 5.0 versions earlier than Cortex XDR agent 5.0.12; Cortex XDR agent 6.1 versions earlier than Cortex XDR agent 6.1.9; Cortex XDR agent 7.2 versions ear... • https://security.paloaltonetworks.com/CVE-2022-0014 • CWE-426: Untrusted Search Path •

CVE-2022-0013 – Cortex XDR Agent: File Information Exposure Vulnerability When Generating Support File
https://notcve.org/view.php?id=CVE-2022-0013
12 Jan 2022 — A file information exposure vulnerability exists in the Palo Alto Networks Cortex XDR agent that enables a local attacker to read the contents of arbitrary files on the system with elevated privileges when generating a support file. This issue impacts: Cortex XDR agent 5.0 versions earlier than Cortex XDR agent 5.0.12; Cortex XDR agent 6.1 versions earlier than Cortex XDR agent 6.1.9; Cortex XDR agent 7.2 versions earlier than Cortex XDR agent 7.2.4; Cortex XDR agent 7.3 versions earlier than Cortex XDR age... • https://security.paloaltonetworks.com/CVE-2022-0013 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-538: Insertion of Sensitive Information into Externally-Accessible File or Directory •