Логотип exploitDog
bind:CVE-2025-0126
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-0126

Количество 3

Количество 3

nvd логотип

CVE-2025-0126

10 месяцев назад

When configured using SAML, a session fixation vulnerability in the GlobalProtect™ login enables an attacker to impersonate a legitimate authorized user and perform actions as that GlobalProtect user. This requires the legitimate user to first click on a malicious link provided by the attacker. The SAML login for the PAN-OS® management interface is not affected. Additionally, this issue does not affect Cloud NGFW and all Prisma® Access instances are proactively patched.

EPSS: Низкий
github логотип

GHSA-6whh-pf24-fvfr

10 месяцев назад

When configured using SAML, a session fixation vulnerability in the GlobalProtect™ login enables an attacker to impersonate a legitimate authorized user and perform actions as that GlobalProtect user. This requires the legitimate user to first click on a malicious link provided by the attacker. The SAML login for the PAN-OS® management interface is not affected. Additionally, this issue does not affect Cloud NGFW and all Prisma® Access instances are proactively patched.

EPSS: Низкий
fstec логотип

BDU:2025-04902

10 месяцев назад

Уязвимость технологии SAML (Security Assertion Markup Language) операционной системы PAN-OS, позволяющая нарушителю повысить свои привилегии

CVSS3: 8.2
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-0126

When configured using SAML, a session fixation vulnerability in the GlobalProtect™ login enables an attacker to impersonate a legitimate authorized user and perform actions as that GlobalProtect user. This requires the legitimate user to first click on a malicious link provided by the attacker. The SAML login for the PAN-OS® management interface is not affected. Additionally, this issue does not affect Cloud NGFW and all Prisma® Access instances are proactively patched.

0%
Низкий
10 месяцев назад
github логотип
GHSA-6whh-pf24-fvfr

When configured using SAML, a session fixation vulnerability in the GlobalProtect™ login enables an attacker to impersonate a legitimate authorized user and perform actions as that GlobalProtect user. This requires the legitimate user to first click on a malicious link provided by the attacker. The SAML login for the PAN-OS® management interface is not affected. Additionally, this issue does not affect Cloud NGFW and all Prisma® Access instances are proactively patched.

0%
Низкий
10 месяцев назад
fstec логотип
BDU:2025-04902

Уязвимость технологии SAML (Security Assertion Markup Language) операционной системы PAN-OS, позволяющая нарушителю повысить свои привилегии

CVSS3: 8.2
0%
Низкий
10 месяцев назад

Уязвимостей на страницу