Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-6whh-pf24-fvfr

Опубликовано: 11 апр. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 8.3

Описание

When configured using SAML, a session fixation vulnerability in the GlobalProtect™ login enables an attacker to impersonate a legitimate authorized user and perform actions as that GlobalProtect user. This requires the legitimate user to first click on a malicious link provided by the attacker.

The SAML login for the PAN-OS® management interface is not affected. Additionally, this issue does not affect Cloud NGFW and all Prisma® Access instances are proactively patched.

When configured using SAML, a session fixation vulnerability in the GlobalProtect™ login enables an attacker to impersonate a legitimate authorized user and perform actions as that GlobalProtect user. This requires the legitimate user to first click on a malicious link provided by the attacker.

The SAML login for the PAN-OS® management interface is not affected. Additionally, this issue does not affect Cloud NGFW and all Prisma® Access instances are proactively patched.

EPSS

Процентиль: 24%
0.00082
Низкий

8.3 High

CVSS4

Дефекты

CWE-384

Связанные уязвимости

nvd
10 месяцев назад

When configured using SAML, a session fixation vulnerability in the GlobalProtect™ login enables an attacker to impersonate a legitimate authorized user and perform actions as that GlobalProtect user. This requires the legitimate user to first click on a malicious link provided by the attacker. The SAML login for the PAN-OS® management interface is not affected. Additionally, this issue does not affect Cloud NGFW and all Prisma® Access instances are proactively patched.

CVSS3: 8.2
fstec
10 месяцев назад

Уязвимость технологии SAML (Security Assertion Markup Language) операционной системы PAN-OS, позволяющая нарушителю повысить свои привилегии

EPSS

Процентиль: 24%
0.00082
Низкий

8.3 High

CVSS4

Дефекты

CWE-384