CWE
200 201
Advisory Published
Updated

CVE-2022-0018: GlobalProtect App: Information Exposure Vulnerability When Connecting to GlobalProtect Portal With Single Sign-On Enabled

First published: Thu Feb 10 2022(Updated: )

An information exposure vulnerability exists in the Palo Alto Networks GlobalProtect app on Windows and MacOS where the credentials of the local user account are sent to the GlobalProtect portal when the Single Sign-On feature is enabled in the GlobalProtect portal configuration. This product behavior is intentional and poses no security risk when connecting to trusted GlobalProtect portals configured to use the same Single Sign-On credentials both for the local user account as well as the GlobalProtect login. However when the credentials are different, the local account credentials are inadvertently sent to the GlobalProtect portal for authentication. A third party MITM type of attacker cannot see these credentials in transit. This vulnerability is a concern where the GlobalProtect app is deployed on Bring-your-Own-Device (BYOD) type of clients with private local user accounts or GlobalProtect app is used to connect to different organizations. Fixed versions of GlobalProtect app have an app setting to prevent the transmission of the user's local user credentials to the target GlobalProtect portal regardless of the portal configuration. This issue impacts: GlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.10 on Windows and MacOS; GlobalProtect app 5.2 versions earlier than GlobalProtect app 5.2.9 on Windows and MacOS This issue does not affect GlobalProtect app on other platforms.

Credit: psirt@paloaltonetworks.com

Affected SoftwareAffected VersionHow to fix
Paloaltonetworks Globalprotect>=5.1<5.1.10
Paloaltonetworks Globalprotect>=5.2<5.2.9
Apple macOS
Microsoft Windows

Remedy

This issue is fixed in GlobalProtect app 5.1.10 on Windows and MacOS, GlobalProtect app 5.2.9 on Windows and MacOS, and all later GlobalProtect app versions with the ‘force-disable-sso’ app setting. Set ‘force-disable-sso’ to ‘yes’ to prevent unintended transmission of the local user credentials as described here: https://docs.paloaltonetworks.com/globalprotect/10-1/globalprotect-admin/globalprotect-apps/deploy-app-settings-transparently/customizable-app-settings/app-behavior-options.html

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2022-0018?

    CVE-2022-0018 is an information exposure vulnerability in the Palo Alto Networks GlobalProtect app on Windows and MacOS.

  • What is the affected software for CVE-2022-0018?

    The affected software for CVE-2022-0018 is Palo Alto Networks GlobalProtect version 5.1.0 to 5.1.9 and version 5.2.0 to 5.2.8 on Windows and MacOS.

  • How severe is CVE-2022-0018?

    CVE-2022-0018 has a severity rating of 6.5 out of 10.

  • How does CVE-2022-0018 work?

    CVE-2022-0018 occurs when the credentials of the local user account are sent to the GlobalProtect portal when the Single Sign-On feature is enabled in the GlobalProtect portal configuration.

  • How can CVE-2022-0018 be fixed?

    To fix CVE-2022-0018, update Palo Alto Networks GlobalProtect to version 5.1.10 or later for versions 5.1.x, and version 5.2.9 or later for versions 5.2.x.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203