Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-2050— PAN-OS: Authentication bypass vulnerability in GlobalProtect SSL VPN client certificate verification

CVSS 8.2 · High EPSS 0.16% · P36
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2020-2050

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
PAN-OS: Authentication bypass vulnerability in GlobalProtect SSL VPN client certificate verification
Source: NVD (National Vulnerability Database)
Vulnerability Description
An authentication bypass vulnerability exists in the GlobalProtect SSL VPN component of Palo Alto Networks PAN-OS software that allows an attacker to bypass all client certificate checks with an invalid certificate. A remote attacker can successfully authenticate as any user and gain access to restricted VPN network resources when the gateway or portal is configured to rely entirely on certificate-based authentication. Impacted features that use SSL VPN with client certificate verification are: GlobalProtect Gateway, GlobalProtect Portal, GlobalProtect Clientless VPN In configurations where client certificate verification is used in conjunction with other authentication methods, the protections added by the certificate check are ignored as a result of this issue. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.17; PAN-OS 9.0 versions earlier than PAN-OS 9.0.11; PAN-OS 9.1 versions earlier than PAN-OS 9.1.5; PAN-OS 10.0 versions earlier than PAN-OS 10.0.1.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
授权机制不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
Palo Alto Networks PAN-OS和GlobalProtect 授权问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Palo Alto Networks PAN-OS和GlobalProtect都是美国Palo Alto Networks公司的产品。Palo Alto Networks PAN-OS是一套为其防火墙设备开发的操作系统。GlobalProtect是一套网络防护软件。该软件可提供防火墙监控及威胁预防等功能。 Palo Alto GlobalProtect SSL VPN组件存在授权问题漏洞,该漏洞源于存在一个认证绕过漏洞,攻击者可利用该漏洞绕过所有使用无效证书的客户端证书检查。当网关或门户被配置为完全依赖基
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Palo Alto NetworksPAN-OS 8.1 ~ 8.1.17 -

II. Public POCs for CVE-2020-2050

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2020-2050

登录查看更多情报信息。

Same Patch Batch · Palo Alto Networks · 2020-11-12 · 5 CVEs total

CVE-2020-20227.5 HIGHPAN-OS: Panorama session disclosure during context switch into managed device
CVE-2020-20007.2 HIGHPAN-OS: OS command injection and memory corruption vulnerability
CVE-2020-19995.3 MEDIUMPAN-OS: Threat signatures are evaded by specifically crafted packets
CVE-2020-20483.3 LOWPAN-OS: System proxy passwords may be logged in clear text while viewing system state

IV. Related Vulnerabilities

V. Comments for CVE-2020-2050

No comments yet


Leave a comment