Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2020-2033


When the pre-logon feature is enabled, a missing certification validation in Palo Alto Networks GlobalProtect app can disclose the pre-logon authentication cookie to a man-in-the-middle attacker on the same local area network segment with the ability to manipulate ARP or to conduct ARP spoofing attacks. This allows the attacker to access the GlobalProtect Server as allowed by configured Security rules for the 'pre-login' user. This access may be limited compared to the network access of regular users. This issue affects: GlobalProtect app 5.0 versions earlier than GlobalProtect app 5.0.10 when the prelogon feature is enabled; GlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.4 when the prelogon feature is enabled.


Published

2020-06-10T18:15:11.860

Last Modified

2024-11-21T05:24:30.417

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 5.3 (MEDIUM)

CVSSv2 Vector

AV:A/AC:M/Au:N/C:P/I:N/A:N

  • Access Vector: ADJACENT_NETWORK
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: NONE
  • Availability Impact: NONE
Exploitability Score

5.5

Impact Score

2.9

Weaknesses
  • Type: Secondary
    CWE-290
    CWE-295
  • Type: Primary
    CWE-290
    CWE-295

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application paloaltonetworks globalprotect < 5.0.10 Yes
Application paloaltonetworks globalprotect < 5.1.4 Yes

References