GlobalProtect Agent 4.1.0 for Windows and GlobalProtect Agent 4.1.10 and earlier for macOS may allow a local authenticated attacker who has compromised the end-user account and gained the ability to inspect memory, to access authentication and/or session tokens and replay them to spoof the VPN session and gain access as the user.
Metrics
Affected Vendors & Products
Fixes
Solution
This issue is fixed in GlobalProtect Agent 4.1.1 and later for Windows, and GlobalProtect Agent 4.1.11 and later for macOS.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: palo_alto
Published:
Updated: 2024-09-16T19:21:01.439Z
Reserved: 2018-12-06T00:00:00
Link: CVE-2019-1573

No data.

Status : Modified
Published: 2019-04-09T22:29:00.877
Modified: 2024-11-21T04:36:50.333
Link: CVE-2019-1573

No data.

No data.