Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-0019— GlobalProtect App: Insufficiently Protected Credentials Vulnerability on Linux

CVSS 4.7 · Medium EPSS 0.04% · P12
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2022-0019

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
GlobalProtect App: Insufficiently Protected Credentials Vulnerability on Linux
Source: NVD (National Vulnerability Database)
Vulnerability Description
An insufficiently protected credentials vulnerability exists in the Palo Alto Networks GlobalProtect app on Linux that exposes the hashed credentials of GlobalProtect users that saved their password during previous GlobalProtect app sessions to other local users on the system. The exposed credentials enable a local attacker to authenticate to the GlobalProtect portal or gateway as the target user without knowing of the target user’s plaintext password. This issue impacts: GlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.10 on Linux. GlobalProtect app 5.2 versions earlier than and including GlobalProtect app 5.2.7 on Linux. GlobalProtect app 5.3 versions earlier than GlobalProtect app 5.3.2 on Linux. This issue does not affect the GlobalProtect app on other platforms.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
不充分的凭证保护机制
Source: NVD (National Vulnerability Database)
Vulnerability Title
GlobalProtect 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Palo Alto Networks GlobalProtect是美国Palo Alto Networks公司的一套网络防护软件。该软件可提供防火墙监控及威胁预防等功能。 Linux上的Palo Alto Networks GlobalProtect应用程序中存在安全漏洞,它将GlobalProtect用户在先前GlobalProtect应用程序会话中保存密码的散列凭据暴露给系统上的其他本地用户。公开的凭据使本地攻击者可利用该漏洞能够作为目标用户向GlobalProtect门户或网关进行身份验证。以下产品
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Palo Alto NetworksGlobalProtect App 5.3 ~ 5.3.2 -

II. Public POCs for CVE-2022-0019

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2022-0019

登录查看更多情报信息。

Same Patch Batch · Palo Alto Networks · 2022-02-10 · 7 CVEs total

CVE-2022-00167.4 HIGHGlobalProtect App: Privilege Escalation Vulnerability When Using Connect Before Logon
CVE-2022-00177.0 HIGHGlobalProtect App: Improper Link Resolution Vulnerability Leads to Local Privilege Escalat
CVE-2022-00206.8 MEDIUMCortex XSOAR: Stored Cross-Site Scripting (XSS) Vulnerability in Web Interface
CVE-2022-00116.5 MEDIUMPAN-OS: URL Category Exceptions Match More URLs Than Intended in URL Filtering
CVE-2022-00186.1 MEDIUMGlobalProtect App: Information Exposure Vulnerability When Connecting to GlobalProtect Por
CVE-2022-00213.3 LOWGlobalProtect App: Information Exposure Vulnerability When Using Connect Before Logon

IV. Related Vulnerabilities

V. Comments for CVE-2022-0019

No comments yet


Leave a comment