Palo Alto Networks Security Advisories / CVE-2022-0021

CVE-2022-0021 GlobalProtect App: Information Exposure Vulnerability When Using Connect Before Logon

Severity 3.3 · LOW
Attack Vector LOCAL
Attack Complexity LOW
Confidentiality Impact LOW
Privileges Required LOW
Integrity Impact NONE
User Interaction NONE
Availability Impact NONE


An information exposure through log file vulnerability exists in the Palo Alto Networks GlobalProtect app on Windows that logs the cleartext credentials of the connecting GlobalProtect user when authenticating using Connect Before Logon feature.

This issue impacts GlobalProtect App 5.2 versions earlier than 5.2.9 on Windows.

This issue does not affect the GlobalProtect app on other platforms.

Product Status

GlobalProtect App 5.3None5.3.*
GlobalProtect App 5.2< 5.2.9 on Windows>= 5.2.9 on Windows
GlobalProtect App 5.1None5.1.*

Required Configuration for Exposure

This issue is applicable only to devices configured to use the GlobalProtect Connect Before Logon feature.

Severity: LOW

CVSSv3.1 Base Score: 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)

Exploitation Status

Palo Alto Networks is not aware of any malicious exploitation of this issue.

Weakness Type

CWE-532 Information Exposure Through Log Files


This issue is fixed in GlobalProtect app 5.2.9 on Windows and all later GlobalProtect app versions.

Workarounds and Mitigations

There are no known workarounds for this issue.


This issue was found by Rutger Truyers of Palo Alto Networks during internal security review.


Initial publication
© 2024 Palo Alto Networks, Inc. All rights reserved.