GlobalProtect Agent 4.1.0 for Windows and GlobalProtect Agent 4.1.10 and earlier for macOS may allow a local authenticated attacker who has compromised the end-user account and gained the ability to inspect memory, to access authentication and/or session tokens and replay them to spoof the VPN session and gain access as the user.
References
Link | Resource |
---|---|
https://www.kb.cert.org/vuls/id/192371 | Third Party Advisory US Government Resource |
http://www.securityfocus.com/bid/107868 | Third Party Advisory VDB Entry |
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0005 | Third Party Advisory |
https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2019-783 | Third Party Advisory |
https://security.paloaltonetworks.com/CVE-2019-1573 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2019-04-09 15:29
Updated : 2021-09-14 05:14
NVD link : CVE-2019-1573
Mitre link : CVE-2019-1573
JSON object : View
CWE
CWE-311
Missing Encryption of Sensitive Data
Products Affected
paloaltonetworks
- globalprotect