Lucene search

K
cvelistPalo_altoCVELIST:CVE-2024-3388
HistoryApr 10, 2024 - 5:06 p.m.

CVE-2024-3388 PAN-OS: User Impersonation in GlobalProtect SSL VPN

2024-04-1017:06:40
CWE-269
CWE-863
palo_alto
www.cve.org
4
cve-2024-3388
pan-os
user impersonation
globalprotect
ssl vpn
authenticated attacker
vulnerability
network packets
internal assets

CVSS3

4.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N

AI Score

4.6

Confidence

High

EPSS

0

Percentile

9.0%

A vulnerability in the GlobalProtect Gateway in Palo Alto Networks PAN-OS software enables an authenticated attacker to impersonate another user and send network packets to internal assets. However, this vulnerability does not allow the attacker to receive response packets from those internal assets.

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "PAN-OS",
    "vendor": "Palo Alto Networks",
    "versions": [
      {
        "changes": [
          {
            "at": "8.1.26",
            "status": "unaffected"
          }
        ],
        "lessThan": "8.1.26",
        "status": "affected",
        "version": "8.1.0",
        "versionType": "custom"
      },
      {
        "changes": [
          {
            "at": "9.0.17-h4",
            "status": "unaffected"
          }
        ],
        "lessThan": "9.0.17-h4",
        "status": "affected",
        "version": "9.0.0",
        "versionType": "custom"
      },
      {
        "changes": [
          {
            "at": "9.1.17",
            "status": "unaffected"
          }
        ],
        "lessThan": "9.1.17",
        "status": "affected",
        "version": "9.1.0",
        "versionType": "custom"
      },
      {
        "changes": [
          {
            "at": "10.1.11-h4",
            "status": "unaffected"
          }
        ],
        "lessThan": "10.1.11-h4",
        "status": "affected",
        "version": "10.1.0",
        "versionType": "custom"
      },
      {
        "changes": [
          {
            "at": "10.2.7-h3",
            "status": "unaffected"
          }
        ],
        "lessThan": "10.2.7-h3",
        "status": "affected",
        "version": "10.2.0",
        "versionType": "custom"
      },
      {
        "changes": [
          {
            "at": "11.0.3",
            "status": "unaffected"
          }
        ],
        "lessThan": "11.0.3",
        "status": "affected",
        "version": "11.0.0",
        "versionType": "custom"
      },
      {
        "status": "unaffected",
        "version": "11.1.0"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "Cloud NGFW",
    "vendor": "Palo Alto Networks",
    "versions": [
      {
        "status": "unaffected",
        "version": "All"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "Prisma Access",
    "vendor": "Palo Alto Networks",
    "versions": [
      {
        "changes": [
          {
            "at": "10.2.4",
            "status": "unaffected"
          }
        ],
        "lessThan": "10.2.4",
        "status": "affected",
        "version": "10.2",
        "versionType": "custom"
      }
    ]
  }
]

CVSS3

4.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N

AI Score

4.6

Confidence

High

EPSS

0

Percentile

9.0%

Related for CVELIST:CVE-2024-3388