Vulnerability identifier: #VU60485
Vulnerability risk: Medium
Exploitation vector: Network
Vendor: Palo Alto Networks, Inc.
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to credentials of the local user account are sent to the GlobalProtect portal when the Single Sign-On feature is enabled in the GlobalProtect portal configuration. A remote attacker can perform MitM attack and intercept credentials.
This vulnerability is a concern where the GlobalProtect app is deployed on Bring-your-Own-Device (BYOD) type of clients with private local user accounts or GlobalProtect app is used to connect to different organizations.
Install updates from vendor's website.
Vulnerable software versions
GlobalProtect Agent: 5.1.0 - 5.2.8
Fixed software versions
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?