A problem with the Palo Alto Networks GlobalProtect app can result in exposure of encrypted user credentials, used for connecting to GlobalProtect, in application logs. Normally, these application logs are only viewable by local users and are included when generating logs for troubleshooting purposes. This means that these encrypted credentials are exposed to recipients of the application logs.
AI analysis not yet available
Plain-English explanation, risk summary, and remediation steps will appear here once AI analysis is complete.
No Fix Known
No patch has been released yet. Apply workarounds or mitigations where available.
| Vendor | Product | Versions | Fixed In |
|---|---|---|---|
| paloaltonetworks | globalprotect | 5.1 - 5.1.12 | - |
| paloaltonetworks | globalprotect | 6.0 - 6.0.8 | - |
| paloaltonetworks | globalprotect |
Published
CVE disclosed publicly
Last Modified
Most recent update
Indexed to CVEInsight
Added to this platform
AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
4
Affected Products
2
References
paloaltonetworks / globalprotect
| 6.1 - 6.1.3 |
| - |
| paloaltonetworks | globalprotect | 6.2 - 6.2.3 | - |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Exploitability
Impact