QID 730350
QID 730350: Palo Alto Networks (GlobalProtect App) Insufficiently Protected Credentials Vulnerability (GPC-13843)
The GlobalProtect app provides a simple way to extend the enterprise security policies out to mobile endpoints.
An insufficiently protected credentials vulnerability exists in the Palo Alto Networks GlobalProtect app on Linux that exposes the hashed credentials of GlobalProtect users that saved their password during previous GlobalProtect app sessions to other local users on the system.
Affected Versions:
GlobalProtect App 5.3 versions earlier than GlobalProtect App 5.3.2
GlobalProtect App 5.2 versions earlier than GlobalProtect App 5.2.7
GlobalProtect App 5.1 versions earlier than GlobalProtect App 5.1.10
QID Detection Logic (Authenticated):
This QID looks for the vulnerable version of PAN-OS
NOTE:This issue is applicable only to GlobalProtect app users that save their user credentials for use when authenticating to a GlobalProtect portal.
An insufficiently protected credentials vulnerability exists in the Palo Alto Networks GlobalProtect app on Linux that exposes the hashed credentials of GlobalProtect users that saved their password during previous GlobalProtect app sessions to other local users on the system.
Refer to GPC-13843 for more information about patching this vulnerability.
Workaround:
Users should not save their credentials until the GlobalProtect app is upgraded to a fixed version.
GlobalProtect portal administrators can prevent GlobalProtect app users from saving their credentials on the next connection to the GlobalProtect portal by preventing Save User Credentials from the portal agent configuration as described here:
https://docs.paloaltonetworks.com/globalprotect/10-1/globalprotect-admin/globalprotect-apps/deploy-app-settings-transparently/customizable-app-settings/user-behavior-options.html
- GPC-13843 -
security.paloaltonetworks.com/CVE-2022-0019
CVEs related to QID 730350
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| GPC-13843 |
|