First published: Wed Aug 11 2021(Updated: )
An improper authentication vulnerability exists in Palo Alto Networks PAN-OS software that enables a SAML authenticated attacker to impersonate any other user in the GlobalProtect Portal and GlobalProtect Gateway when they are configured to use SAML authentication. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.19; PAN-OS 9.0 versions earlier than PAN-OS 9.0.14; PAN-OS 9.1 versions earlier than PAN-OS 9.1.9; PAN-OS 10.0 versions earlier than PAN-OS 10.0.5. PAN-OS 10.1 versions are not impacted.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Paloaltonetworks Pan-os | >=8.1.0<8.1.19 | |
Paloaltonetworks Pan-os | >=9.0.0<9.0.14 | |
Paloaltonetworks Pan-os | >=9.1.0<9.1.9 | |
Paloaltonetworks Pan-os | >=10.0.0<10.0.5 |
This issue is fixed in PAN-OS 8.1.19, PAN-OS 9.0.14, PAN-OS 9.1.9, PAN-OS 10.0.5, and all later PAN-OS versions.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-3046.
CVE-2021-3046 has a severity level of medium (6.5).
Palo Alto Networks PAN-OS versions 8.1.0 to 8.1.19, 9.0.0 to 9.0.14, 9.1.0 to 9.1.9, and 10.0.0 to 10.0.5 are affected by CVE-2021-3046.
CVE-2021-3046 allows a SAML authenticated attacker to impersonate any other user in the GlobalProtect Portal and GlobalProtect Gateway.
Yes, Palo Alto Networks has released security patches to address the vulnerability. It is recommended to update to the latest version of PAN-OS software.