This security bulletin contains one low risk vulnerability.
Exploit availability: NoDescription
The vulnerability allows a local user to view the password on the target system.
The vulnerability exists due to a user's password may be logged in cleartext in the "PanGPS.log" diagnostic file when logs are collected for troubleshooting. A local user can obtain this credential.Mitigation
Install updates from vendor's website.Vulnerable software versions
GlobalProtect Agent: before 5.1.2before 5.0.9, 5.1.2
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?