Palo Alto Networks Security Advisories / CVE-2021-3057

CVE-2021-3057 GlobalProtect App: Buffer Overflow Vulnerability When Connecting to Portal or Gateway

047910
Severity 8.1 · HIGH
Attack Vector NETWORK
Attack Complexity HIGH
Privileges Required NONE
User Interaction NONE
Scope UNCHANGED
Confidentiality Impact HIGH
Integrity Impact HIGH
Availability Impact HIGH

Description

A stack-based buffer overflow vulnerability exists in the Palo Alto Networks GlobalProtect app that enables a man-in-the-middle attacker to disrupt system processes and potentially execute arbitrary code with SYSTEM privileges.

This issue impacts:

GlobalProtect app 5.3 versions earlier than GlobalProtect app 5.3.1 on Linux;

GlobalProtect app 5.2 versions earlier than GlobalProtect app 5.2.8 on Windows, Universal Windows Platform, Linux, and MacOS;

GlobalProtect app 5.1 versions on Windows, Universal Windows Platform, Linux, and MacOS;

GlobalProtect app 5.0 versions on Windows, Universal Windows Platform, Linux, and MacOS.

Product Status

VersionsAffectedUnaffected
GlobalProtect App 5.3< 5.3.1 on Linux>= 5.3.1 on Linux
GlobalProtect App 5.2< 5.2.8 on Windows, Universal Windows Platform, Linux, MacOS>= 5.2.8 on Windows, Universal Windows Platform, Linux, MacOS
GlobalProtect App 5.15.1.* on Windows, Universal Windows Platform, Linux, MacOS
GlobalProtect App 5.05.0.* on Windows, Universal Windows Platform, Linux, MacOS

Severity: HIGH

CVSSv3.1 Base Score: 8.1 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)

Exploitation Status

Palo Alto Networks is not aware of any malicious exploitation of this issue.

Weakness Type

CWE-121 Stack-based Buffer Overflow

Solution

This issue is fixed in GlobalProtect app 5.2.8 on Windows, Universal Windows Platform, Linux, and MacOS; GlobalProtect app 5.3.1 on Linux; and all later GlobalProtect app versions.

Workarounds and Mitigations

There are no known workarounds for this issue.

Acknowledgments

Palo Alto Networks thanks Tomas Rzepka of F-Secure for discovering and reporting this issue.

Timeline

Updated affected platforms
Initial publication
© 2020 Palo Alto Networks, Inc. All rights reserved.