Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2022-0018

Опубликовано: 10 фев. 2022
Источник: nvd
CVSS3: 6.1
CVSS3: 6.5
CVSS2: 2.6
EPSS Низкий

Описание

An information exposure vulnerability exists in the Palo Alto Networks GlobalProtect app on Windows and MacOS where the credentials of the local user account are sent to the GlobalProtect portal when the Single Sign-On feature is enabled in the GlobalProtect portal configuration. This product behavior is intentional and poses no security risk when connecting to trusted GlobalProtect portals configured to use the same Single Sign-On credentials both for the local user account as well as the GlobalProtect login. However when the credentials are different, the local account credentials are inadvertently sent to the GlobalProtect portal for authentication. A third party MITM type of attacker cannot see these credentials in transit. This vulnerability is a concern where the GlobalProtect app is deployed on Bring-your-Own-Device (BYOD) type of clients with private local user accounts or GlobalProtect app is used to connect to different organizations. Fixed versions of GlobalProtect app have

Уязвимые конфигурации

Конфигурация 1

Одновременно

Одно из

cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:*:*:*
Версия от 5.1 (включая) до 5.1.10 (исключая)
cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:*:*:*
Версия от 5.2 (включая) до 5.2.9 (исключая)

Одно из

cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

EPSS

Процентиль: 48%
0.00253
Низкий

6.1 Medium

CVSS3

6.5 Medium

CVSS3

2.6 Low

CVSS2

Дефекты

CWE-201
CWE-200

Связанные уязвимости

github
почти 4 года назад

An information exposure vulnerability exists in the Palo Alto Networks GlobalProtect app on Windows and MacOS where the credentials of the local user account are sent to the GlobalProtect portal when the Single Sign-On feature is enabled in the GlobalProtect portal configuration. This product behavior is intentional and poses no security risk when connecting to trusted GlobalProtect portals configured to use the same Single Sign-On credentials both for the local user account as well as the GlobalProtect login. However when the credentials are different, the local account credentials are inadvertently sent to the GlobalProtect portal for authentication. A third party MITM type of attacker cannot see these credentials in transit. This vulnerability is a concern where the GlobalProtect app is deployed on Bring-your-Own-Device (BYOD) type of clients with private local user accounts or GlobalProtect app is used to connect to different organizations. Fixed versions of GlobalProtect app ha...

EPSS

Процентиль: 48%
0.00253
Низкий

6.1 Medium

CVSS3

6.5 Medium

CVSS3

2.6 Low

CVSS2

Дефекты

CWE-201
CWE-200