CVE-2022-0021 GlobalProtect App: Information Exposure Vulnerability When Using Connect Before Logon
Description
An information exposure through log file vulnerability exists in the Palo Alto Networks GlobalProtect app on Windows that logs the cleartext credentials of the connecting GlobalProtect user when authenticating using Connect Before Logon feature.
This issue impacts GlobalProtect App 5.2 versions earlier than 5.2.9 on Windows.
This issue does not affect the GlobalProtect app on other platforms.
Product Status
Versions | Affected | Unaffected |
---|---|---|
GlobalProtect App 5.3 | None | 5.3.* |
GlobalProtect App 5.2 | < 5.2.9 on Windows | >= 5.2.9 on Windows |
GlobalProtect App 5.1 | None | 5.1.* |
Required Configuration for Exposure
This issue is applicable only to devices configured to use the GlobalProtect Connect Before Logon feature.
Severity: LOW
CVSSv3.1 Base Score: 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)
Exploitation Status
Palo Alto Networks is not aware of any malicious exploitation of this issue.
Weakness Type
CWE-532 Information Exposure Through Log Files
Solution
This issue is fixed in GlobalProtect app 5.2.9 on Windows and all later GlobalProtect app versions.
Workarounds and Mitigations
There are no known workarounds for this issue.