Lucene search

K
cve[email protected]CVE-2020-2050
HistoryNov 12, 2020 - 12:15 a.m.

CVE-2020-2050

2020-11-1200:15:10
CWE-285
CWE-287
web.nvd.nist.gov
75
2
cve-2020-2050
authentication bypass
globalprotect
ssl vpn
palo alto networks
pan-os
vulnerability
nvd

6.4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:P/A:N

8.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N

8.3 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

62.2%

An authentication bypass vulnerability exists in the GlobalProtect SSL VPN component of Palo Alto Networks PAN-OS software that allows an attacker to bypass all client certificate checks with an invalid certificate. A remote attacker can successfully authenticate as any user and gain access to restricted VPN network resources when the gateway or portal is configured to rely entirely on certificate-based authentication. Impacted features that use SSL VPN with client certificate verification are: GlobalProtect Gateway, GlobalProtect Portal, GlobalProtect Clientless VPN In configurations where client certificate verification is used in conjunction with other authentication methods, the protections added by the certificate check are ignored as a result of this issue. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.17; PAN-OS 9.0 versions earlier than PAN-OS 9.0.11; PAN-OS 9.1 versions earlier than PAN-OS 9.1.5; PAN-OS 10.0 versions earlier than PAN-OS 10.0.1.

Affected configurations

NVD
Node
paloaltonetworkspan-osRange8.1.08.1.17
OR
paloaltonetworkspan-osRange9.0.09.0.11
OR
paloaltonetworkspan-osRange9.1.09.1.5
OR
paloaltonetworkspan-osRange10.0.010.0.1

CNA Affected

[
  {
    "product": "PAN-OS",
    "vendor": "Palo Alto Networks",
    "versions": [
      {
        "changes": [
          {
            "at": "8.1.17",
            "status": "unaffected"
          }
        ],
        "lessThan": "8.1.17",
        "status": "affected",
        "version": "8.1",
        "versionType": "custom"
      },
      {
        "changes": [
          {
            "at": "9.0.11",
            "status": "unaffected"
          }
        ],
        "lessThan": "9.0.11",
        "status": "affected",
        "version": "9.0",
        "versionType": "custom"
      },
      {
        "changes": [
          {
            "at": "9.1.5",
            "status": "unaffected"
          }
        ],
        "lessThan": "9.1.5",
        "status": "affected",
        "version": "9.1",
        "versionType": "custom"
      },
      {
        "changes": [
          {
            "at": "10.0.1",
            "status": "unaffected"
          }
        ],
        "lessThan": "10.0.1",
        "status": "affected",
        "version": "10.0",
        "versionType": "custom"
      }
    ]
  }
]

Social References

More

6.4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:P/A:N

8.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N

8.3 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

62.2%

Related for CVE-2020-2050