Lucene search

K
cve[email protected]CVE-2022-0019
HistoryFeb 10, 2022 - 6:15 p.m.

CVE-2022-0019

2022-02-1018:15:08
CWE-522
web.nvd.nist.gov
49
1
"cve-2022-0019
palo alto networks
globalprotect
linux
vulnerability
credentials
security"

1.9 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:M/Au:N/C:P/I:N/A:N

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

5.5 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%

An insufficiently protected credentials vulnerability exists in the Palo Alto Networks GlobalProtect app on Linux that exposes the hashed credentials of GlobalProtect users that saved their password during previous GlobalProtect app sessions to other local users on the system. The exposed credentials enable a local attacker to authenticate to the GlobalProtect portal or gateway as the target user without knowing of the target user’s plaintext password. This issue impacts: GlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.10 on Linux. GlobalProtect app 5.2 versions earlier than and including GlobalProtect app 5.2.7 on Linux. GlobalProtect app 5.3 versions earlier than GlobalProtect app 5.3.2 on Linux. This issue does not affect the GlobalProtect app on other platforms.

Affected configurations

NVD
Node
paloaltonetworksglobalprotectRange5.1–5.1.10
OR
paloaltonetworksglobalprotectRange5.2–5.2.7
OR
paloaltonetworksglobalprotectRange5.3–5.3.2
AND
linuxlinux_kernelMatch-

CNA Affected

[
  {
    "platforms": [
      "Linux"
    ],
    "product": "GlobalProtect App",
    "vendor": "Palo Alto Networks",
    "versions": [
      {
        "changes": [
          {
            "at": "5.3.2",
            "status": "unaffected"
          }
        ],
        "lessThan": "5.3.2",
        "status": "affected",
        "version": "5.3",
        "versionType": "custom"
      },
      {
        "lessThanOrEqual": "5.2.7",
        "status": "affected",
        "version": "5.2",
        "versionType": "custom"
      },
      {
        "changes": [
          {
            "at": "5.1.10",
            "status": "unaffected"
          }
        ],
        "lessThan": "5.1.10",
        "status": "affected",
        "version": "5.1",
        "versionType": "custom"
      }
    ]
  }
]

Social References

More

1.9 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:M/Au:N/C:P/I:N/A:N

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

5.5 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%

Related for CVE-2022-0019