Non-Privileged User Disables GlobalProtect App in Configurations Allowing Passcode Disablement
CVE-2024-2431
5.5MEDIUM
Key Information:
- Vendor
- Palo Alto Networks
- Status
- Vendor
- CVE Published:
- 13 March 2024
Badges
๐พ Exploit Exists
Summary
A vulnerability exists within the Palo Alto Networks GlobalProtect app that permits a non-privileged user to disable the application under specific configurations that allow such actions using a passcode. This could lead to unauthorized access and security bypass, posing a significant risk to network integrity. Organizations leveraging GlobalProtect for secure network access should assess the impact of this issue on their system configurations and take the necessary precautions to mitigate any potential risks.
Affected Version(s)
GlobalProtect App 6.0 < 6.0.4
GlobalProtect App 5.1 < 5.1.12
GlobalProtect App 5.2 < 5.2.13
References
CVSS V3.1
Score:
5.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
Collectors
NVD DatabaseMitre Database
Credit
Palo Alto Networks thanks AIG Red Team and Stephen Collyer for discovering and reporting this issue.