This security bulletin contains one low risk vulnerability.
Exploit availability: NoDescription
The vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to hashed credentials of GlobalProtect users that saved their password during previous GlobalProtect app sessions are accessible by other users on the system. A local user can obtain hashed credentials and recover the password.
Note, the vulnerability affects Linux clients only.
Install updates from vendor's website.Vulnerable software versions
GlobalProtect Agent: 5.1.0 - 5.3.1
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?