First published: Thu Nov 12 2020(Updated: )
An authentication bypass vulnerability exists in the GlobalProtect SSL VPN component of Palo Alto Networks PAN-OS software that allows an attacker to bypass all client certificate checks with an invalid certificate. A remote attacker can successfully authenticate as any user and gain access to restricted VPN network resources when the gateway or portal is configured to rely entirely on certificate-based authentication. Impacted features that use SSL VPN with client certificate verification are: GlobalProtect Gateway, GlobalProtect Portal, GlobalProtect Clientless VPN In configurations where client certificate verification is used in conjunction with other authentication methods, the protections added by the certificate check are ignored as a result of this issue. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.17; PAN-OS 9.0 versions earlier than PAN-OS 9.0.11; PAN-OS 9.1 versions earlier than PAN-OS 9.1.5; PAN-OS 10.0 versions earlier than PAN-OS 10.0.1.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Palo Alto Networks PAN-OS | >=8.1.0<8.1.17 | |
Palo Alto Networks PAN-OS | >=9.0.0<9.0.11 | |
Palo Alto Networks PAN-OS | >=9.1.0<9.1.5 | |
Palo Alto Networks PAN-OS | >=10.0.0<10.0.1 |
This issue is fixed in PAN-OS 8.1.17, PAN-OS 9.0.11, PAN-OS 9.1.5, PAN-OS 10.0.1, and all later PAN-OS versions.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-2050 is an authentication bypass vulnerability in the GlobalProtect SSL VPN component of Palo Alto Networks PAN-OS software.
CVE-2020-2050 has a severity value of 8.2, which is considered high.
Palo Alto Networks PAN-OS software versions 8.1.0 to 8.1.17, 9.0.0 to 9.0.11, 9.1.0 to 9.1.5, and 10.0.0 to 10.0.1 are affected by CVE-2020-2050.
CVE-2020-2050 allows an attacker to bypass all client certificate checks with an invalid certificate, enabling them to authenticate as any user and gain unrestricted access to restricted resources.
To fix CVE-2020-2050, it is recommended to update Palo Alto Networks PAN-OS software to a version that is not affected by the vulnerability.