Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 4 |
CVE-ID | CVE-2022-0021 CVE-2022-0018 CVE-2022-0017 CVE-2022-0016 |
CWE-ID | CWE-532 CWE-200 CWE-59 CWE-703 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
GlobalProtect Agent Client/Desktop applications / Antivirus software/Personal firewalls |
Vendor | Palo Alto Networks, Inc. |
Security Bulletin
This security bulletin contains information about 4 vulnerabilities.
EUVDB-ID: #VU60487
Risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-0021
CWE-ID:
CWE-532 - Information Exposure Through Log Files
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to software stores cleartext credentials of the connecting GlobalProtect user when authenticating using Connect Before Logon feature. A local user can read the log files and gain access to sensitive data.
MitigationInstall updates from vendor's website.
Vulnerable software versionsGlobalProtect Agent: 5.2.0 - 5.2.8
External linkshttp://security.paloaltonetworks.com/CVE-2022-0021
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU60485
Risk: Medium
CVSSv3.1: 5.3 [CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-0018
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to credentials of the local user account are sent to the GlobalProtect portal when the Single Sign-On feature is enabled in the GlobalProtect portal configuration. A remote attacker can perform MitM attack and intercept credentials.
This vulnerability is a concern where the GlobalProtect app is deployed on Bring-your-Own-Device (BYOD) type of clients with private local user accounts or GlobalProtect app is used to connect to different organizations.
MitigationInstall updates from vendor's website.
Vulnerable software versionsGlobalProtect Agent: 5.1.0 - 5.2.8
External linkshttp://security.paloaltonetworks.com/CVE-2022-0018
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU60484
Risk: Low
CVSSv3.1: 7.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-0017
CWE-ID:
CWE-59 - Improper Link Resolution Before File Access ('Link Following')
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to insecure link following issue. A local user can create a specially crafted symbolic link to a critical file on the system and overwrite it with SYSTEM privileges.
Install updates from vendor's website.
Vulnerable software versionsGlobalProtect Agent: 5.1.0 - 5.2.4
External linkshttp://security.paloaltonetworks.com/CVE-2022-0017
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU60483
Risk: Low
CVSSv3.1: 7.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-0016
CWE-ID:
CWE-703 - Improper Check or Handling of Exceptional Conditions
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to improper handling of exceptional conditions within the Connect Before Logon feature. A local user can under certain circumstances execute arbitrary code with SYSTEM privileges when authenticating with Connect Before Logon.
MitigationInstall updates from vendor's website.
Vulnerable software versionsGlobalProtect Agent: 5.2.0 - 5.2.8
External linkshttp://security.paloaltonetworks.com/CVE-2022-0016
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.