Palo Alto Networks Security Advisories / CVE-2022-0021

CVE-2022-0021 GlobalProtect App: Information Exposure Vulnerability When Using Connect Before Logon

047910
Severity 3.3 · LOW
Attack Vector LOCAL
Scope UNCHANGED
Attack Complexity LOW
Confidentiality Impact LOW
Privileges Required LOW
Integrity Impact NONE
User Interaction NONE
Availability Impact NONE

Description

An information exposure through log file vulnerability exists in the Palo Alto Networks GlobalProtect app on Windows that logs the cleartext credentials of the connecting GlobalProtect user when authenticating using Connect Before Logon feature.

This issue impacts GlobalProtect App 5.2 versions earlier than 5.2.9 on Windows.

This issue does not affect the GlobalProtect app on other platforms.

Product Status

VersionsAffectedUnaffected
GlobalProtect App 5.3None5.3.*
GlobalProtect App 5.2< 5.2.9 on Windows>= 5.2.9 on Windows
GlobalProtect App 5.1None5.1.*

Required Configuration for Exposure

This issue is applicable only to devices configured to use the GlobalProtect Connect Before Logon feature.

Severity:LOW

CVSSv3.1 Base Score:3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)

Exploitation Status

Palo Alto Networks is not aware of any malicious exploitation of this issue.

Weakness Type

CWE-532 Information Exposure Through Log Files

Solution

This issue is fixed in GlobalProtect app 5.2.9 on Windows and all later GlobalProtect app versions.

Workarounds and Mitigations

There are no known workarounds for this issue.

Acknowledgments

This issue was found by Rutger Truyers of Palo Alto Networks during internal security review.

Timeline

Initial publication
© 2022 Palo Alto Networks, Inc. All rights reserved.