Lucene search

K
paloaltoPalo Alto Networks Product Security Incident Response TeamPA-CVE-2024-3388
HistoryApr 10, 2024 - 4:00 p.m.

PAN-OS: User Impersonation in GlobalProtect SSL VPN

2024-04-1016:00:00
Palo Alto Networks Product Security Incident Response Team
securityadvisories.paloaltonetworks.com
18
pan-os
globalprotect
gateway vulnerability
user impersonation
ssl vpn
network packets
internal assets
workaround
mitigation

4.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N

6.8 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

8.8%

A vulnerability in the GlobalProtect Gateway in Palo Alto Networks PAN-OS software enables an authenticated attacker to impersonate another user and send network packets to internal assets. However, this vulnerability does not allow the attacker to receive response packets from those internal assets.

Work around:
You can enable the “Disable Automatic Restoration of SSL VPN” (Network > GlobalProtect Gateways > <gateway-config> > GlobalProtect Gateway Configuration > Agent > Connection Settings) on PAN-OS firewalls with the GlobalProtect feature enabled to mitigate this vulnerability.

4.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N

6.8 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

8.8%

Related for PA-CVE-2024-3388