A memory corruption vulnerability in Palo Alto Networks PAN-OS GlobalProtect Clientless VPN enables an authenticated attacker to execute arbitrary code with root user privileges during SAML authentication. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.20; PAN-OS 9.0 versions earlier than PAN-OS 9.0.14; PAN-OS 9.1 versions earlier than PAN-OS 9.1.9; PAN-OS 10.0 versions earlier than PAN-OS 10.0.1. Prisma Access customers with Prisma Access 2.1 Preferred firewalls are impacted by this issue.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://security.paloaltonetworks.com/CVE-2021-3056 |
History
No history.
MITRE
Status: PUBLISHED
Assigner: palo_alto
Published: 2021-11-10T17:10:20.024857Z
Updated: 2024-09-16T20:36:56.323Z
Reserved: 2021-01-06T00:00:00
Link: CVE-2021-3056
Vulnrichment
No data.
NVD
Status : Modified
Published: 2021-11-10T17:15:09.553
Modified: 2024-11-21T06:20:51.940
Link: CVE-2021-3056
Redhat
No data.