A problem with the Palo Alto Networks GlobalProtect app can result in exposure of encrypted user credentials, used for connecting to GlobalProtect, in application logs. Normally, these application logs are only viewable by local users and are included when generating logs for troubleshooting purposes. This means that these encrypted credentials are exposed to recipients of the application logs.
Fixes

Solution

This issue is fixed in GlobalProtect app 5.1.12, GlobalProtect app 6.0.8, GlobalProtect app 6.1.3, GlobalProtect app 6.2.3, and all later GlobalProtect app versions. Customers looking to protect against the impact of this encrypted password disclosure should first delete PanGPS.log files from the GlobalProtect installation directory on all endpoints and then force a rotation of user passwords that are used to connect to GlobalProtect.


Workaround

No workaround given by the vendor.

History

Wed, 07 Aug 2024 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Paloaltonetworks
Paloaltonetworks globalprotect
CPEs cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:*:*:*
Vendors & Products Paloaltonetworks
Paloaltonetworks globalprotect
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: palo_alto

Published:

Updated: 2024-08-09T19:08:25.260Z

Reserved: 2024-06-12T15:27:55.490Z

Link: CVE-2024-5908

cve-icon Vulnrichment

Updated: 2024-08-01T21:25:03.175Z

cve-icon NVD

Status : Modified

Published: 2024-06-12T17:15:53.253

Modified: 2024-11-21T09:48:33.597

Link: CVE-2024-5908

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.