First published: Wed Jun 12 2024(Updated: )
A problem with the Palo Alto Networks GlobalProtect app can result in exposure of encrypted user credentials, used for connecting to GlobalProtect, in application logs. Normally, these application logs are only viewable by local users and are included when generating logs for troubleshooting purposes. This means that these encrypted credentials are exposed to recipients of the application logs.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Palo Alto Networks GlobalProtect UWP App | >=5.1<5.1.12 | |
Palo Alto Networks GlobalProtect UWP App | >=6.0<6.0.8 | |
Palo Alto Networks GlobalProtect UWP App | >=6.1<6.1.3 | |
Palo Alto Networks GlobalProtect UWP App | >=6.2<6.2.3 |
This issue is fixed in GlobalProtect app 5.1.12, GlobalProtect app 6.0.8, GlobalProtect app 6.1.3, GlobalProtect app 6.2.3, and all later GlobalProtect app versions. Customers looking to protect against the impact of this encrypted password disclosure should first delete PanGPS.log files from the GlobalProtect installation directory on all endpoints and then force a rotation of user passwords that are used to connect to GlobalProtect.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-5908 has been rated with a medium severity level due to the potential exposure of sensitive information.
To remediate CVE-2024-5908, upgrade the Palo Alto Networks GlobalProtect app to version 5.1.12 or newer, or version 6.0.8 or newer, or version 6.1.3 or newer, or version 6.2.3 or newer.
The consequences of CVE-2024-5908 include unauthorized access to encrypted user credentials due to their exposure in application logs.
CVE-2024-5908 affects Palo Alto Networks GlobalProtect versions prior to 5.1.12, 6.0.8, 6.1.3, and 6.2.3.
There is currently no documented workaround for CVE-2024-5908 other than applying the latest software updates.