CVE-2021-3057 GlobalProtect App: Buffer Overflow Vulnerability When Connecting to Portal or Gateway
Description
A stack-based buffer overflow vulnerability exists in the Palo Alto Networks GlobalProtect app that enables a man-in-the-middle attacker to disrupt system processes and potentially execute arbitrary code with SYSTEM privileges.
This issue impacts:
GlobalProtect app 5.3 versions earlier than GlobalProtect app 5.3.1 on Linux;
GlobalProtect app 5.2 versions earlier than GlobalProtect app 5.2.8 on Windows, Universal Windows Platform, Linux, and MacOS;
GlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.9 on Windows, Universal Windows Platform, Linux, and MacOS;
GlobalProtect app 5.0 versions on Windows, Universal Windows Platform, Linux, and MacOS.
Product Status
Versions | Affected | Unaffected |
---|---|---|
GlobalProtect App 5.3 | < 5.3.1 on Linux | >= 5.3.1 on Linux |
GlobalProtect App 5.2 | < 5.2.8 on Windows, Universal Windows Platform, Linux, MacOS | >= 5.2.8 on Windows, Universal Windows Platform, MacOS |
GlobalProtect App 5.1 | < 5.1.9 on Windows, Universal Windows Platform, Linux, MacOS | >= 5.1.9 on Windows, Universal Windows Platform, Linux, MacOS |
GlobalProtect App 5.0 | 5.0.* on Windows, Universal Windows Platform, Linux, MacOS | None |
Severity: HIGH
CVSSv3.1 Base Score: 8.1 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)
Exploitation Status
Palo Alto Networks is not aware of any malicious exploitation of this issue.
Weakness Type
CWE-121 Stack-based Buffer Overflow
Solution
This issue is fixed in GlobalProtect app 5.1.9 on Windows, Universal Windows Platform, Linux, and MacOS; GlobalProtect app 5.2.8 on Windows, Universal Windows Platform, and MacOS; GlobalProtect app 5.3.1 on Linux; and all later GlobalProtect app versions.
Workarounds and Mitigations
There are no known workarounds for this issue.