Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-47040 | A problem with the Palo Alto Networks GlobalProtect app can result in exposure of encrypted user credentials, used for connecting to GlobalProtect, in application logs. Normally, these application logs are only viewable by local users and are included when generating logs for troubleshooting purposes. This means that these encrypted credentials are exposed to recipients of the application logs. |
Solution
This issue is fixed in GlobalProtect app 5.1.12, GlobalProtect app 6.0.8, GlobalProtect app 6.1.3, GlobalProtect app 6.2.3, and all later GlobalProtect app versions. Customers looking to protect against the impact of this encrypted password disclosure should first delete PanGPS.log files from the GlobalProtect installation directory on all endpoints and then force a rotation of user passwords that are used to connect to GlobalProtect.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://security.paloaltonetworks.com/CVE-2024-5908 |
|
Wed, 07 Aug 2024 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Paloaltonetworks
Paloaltonetworks globalprotect |
|
| CPEs | cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Paloaltonetworks
Paloaltonetworks globalprotect |
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: palo_alto
Published:
Updated: 2024-08-09T19:08:25.260Z
Reserved: 2024-06-12T15:27:55.490Z
Link: CVE-2024-5908
Updated: 2024-08-01T21:25:03.175Z
Status : Modified
Published: 2024-06-12T17:15:53.253
Modified: 2024-11-21T09:48:33.597
Link: CVE-2024-5908
No data.
OpenCVE Enrichment
No data.
EUVD