Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2019-1573


GlobalProtect Agent 4.1.0 for Windows and GlobalProtect Agent 4.1.10 and earlier for macOS may allow a local authenticated attacker who has compromised the end-user account and gained the ability to inspect memory, to access authentication and/or session tokens and replay them to spoof the VPN session and gain access as the user.


Published

2019-04-09T22:29:00.877

Last Modified

2024-11-21T04:36:50.333

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 2.5 (LOW)

CVSSv2 Vector

AV:L/AC:M/Au:N/C:P/I:N/A:N

  • Access Vector: LOCAL
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: NONE
  • Availability Impact: NONE
Exploitability Score

3.4

Impact Score

2.9

Weaknesses
  • Type: Secondary
    CWE-226
  • Type: Primary
    CWE-311

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application paloaltonetworks globalprotect ≤ 4.1.0 Yes
Application paloaltonetworks globalprotect ≤ 4.1.10 Yes

References