An information exposure vulnerability exists in Palo Alto Networks PAN-OS software that enables a GlobalProtect end user to learn both the configured GlobalProtect uninstall password and the configured disable or disconnect passcode. After the password or passcode is known, end users can uninstall, disable, or disconnect GlobalProtect even if the GlobalProtect app configuration would not normally permit them to do so.
Fixes

Solution

This issue is fixed in PAN-OS 8.1.25, PAN-OS 9.0.17, PAN-OS 9.1.16, PAN-OS 10.0.12, PAN-OS 10.1.9, PAN-OS 10.2.4, PAN-OS 11.0.1, and all later PAN-OS versions. It is also fixed in Prisma Access 10.2.9 and all later Prisma Access versions. To maintain GlobalProtect app functionality for the vulnerable features, we released a corresponding software update for GlobalProtect app 5.1.12, GlobalProtect app 5.2.13, GlobalProtect app 6.0.7, GlobalProtect app 6.1.2, and GlobalProtect app 6.2.1, and all later GlobalProtect app versions. To maintain the ability for end users to use the uninstall password feature and the disable or disconnect passcode feature, you must ensure that you upgrade all GlobalProtect app deployments to a fixed version before you upgrade your PAN-OS software to a fixed version. All fixed versions of GlobalProtect are backwards compatible with vulnerable versions of PAN-OS software. However, fixed versions of PAN-OS software are not backwards compatible with vulnerable versions of GlobalProtect. You can find additional information for PAN-204689 here: https://docs.paloaltonetworks.com/pan-os/11-1/pan-os-release-notes/pan-os-11-1-0-known-and-addressed-issues/pan-os-11-1-0-known-issues Prisma Access customers can open a support case to request an upgrade.


Workaround

Change the following two settings (if enabled) to "Allow with Ticket": * Network > GlobalProtect > Portals > > Agent > > App > Allow User to Disable GlobalProtect App * Network > GlobalProtect > Portals > > Agent > > App > Allow user to disconnect GlobalProtect App Change the following setting (if enabled) to "Disallow": * Network > GlobalProtect > Portals > > Agent > > App > Allow User to Uninstall GlobalProtect App

History

Thu, 03 Oct 2024 00:45:00 +0000

Type Values Removed Values Added
First Time appeared Paloaltonetworks
Paloaltonetworks globalprotect
Paloaltonetworks pan-os
Paloaltonetworks prisma Access
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:*:*:*
cpe:2.3:a:paloaltonetworks:globalprotect:6.2.0:*:*:*:*:*:*:*
cpe:2.3:a:paloaltonetworks:prisma_access:-:*:*:*:*:*:*:*
cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*
cpe:2.3:o:paloaltonetworks:pan-os:11.0.0:*:*:*:*:*:*:*
Vendors & Products Paloaltonetworks
Paloaltonetworks globalprotect
Paloaltonetworks pan-os
Paloaltonetworks prisma Access
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H'}


Wed, 11 Sep 2024 19:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 11 Sep 2024 17:00:00 +0000

Type Values Removed Values Added
Description An information exposure vulnerability exists in Palo Alto Networks PAN-OS software that enables a GlobalProtect end user to learn both the configured GlobalProtect uninstall password and the configured disable or disconnect passcode. After the password or passcode is known, end users can uninstall, disable, or disconnect GlobalProtect even if the GlobalProtect app configuration would not normally permit them to do so.
Title PAN-OS: Cleartext Exposure of GlobalProtect Portal Passcodes
Weaknesses CWE-497
References
Metrics cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:L/SC:N/SI:N/SA:N/AU:N/R:A/V:D/RE:M/U:Amber'}


cve-icon MITRE

Status: PUBLISHED

Assigner: palo_alto

Published:

Updated: 2024-09-11T18:25:14.604Z

Reserved: 2024-09-11T08:21:12.686Z

Link: CVE-2024-8687

cve-icon Vulnrichment

Updated: 2024-09-11T18:25:09.280Z

cve-icon NVD

Status : Analyzed

Published: 2024-09-11T17:15:14.157

Modified: 2024-10-03T00:26:56.110

Link: CVE-2024-8687

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.