First published: Wed Nov 13 2024(Updated: )
An improper certificate validation vulnerability in Palo Alto Networks PAN-OS software enables an authorized user with a specially crafted client certificate to connect to an impacted GlobalProtect portal or GlobalProtect gateway as a different legitimate user. This attack is possible only if you "Allow Authentication with User Credentials OR Client Certificate."
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Palo Alto Networks Cloud NGFW | ||
Palo Alto PAN-OS | <11.0.3=11.0.0<10.2.4-h5=10.2.0<10.1.11=10.1.0 | 11.0.3 10.2.4-h5 10.1.11 |
Prisma |
You can mitigate this issue by setting the "Allow Authentication with User Credentials OR Client Certificate" option to "No." Additional information is available here: https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-web-interface-help/globalprotect/network-globalprotect-portals/globalprotect-portals-authentication-configuration-tab * https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-web-interface-help/globalprotect/network-globalprotect-portals/globalprotect-portals-authentication-configuration-tab * https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-web-interface-help/globalprotect/network-globalprotect-gateways/globalprotect-gateway-authentication-tab https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-web-interface-help/globalprotect/network-globalprotect-gateways/globalprotect-gateway-authentication-tabhttps://docs.paloaltonetworks.com/pan-os/11-0/pan-os-web-interface-help/globalprotect/network-globalprotect-gateways/globalprotect-gateway-authentication-tab
This issue is fixed in PAN-OS 10.1.11, PAN-OS 10.2.4-h5, PAN-OS 10.2.5, PAN-OS 11.0.3, and all later PAN-OS versions.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-5918 is classified as a high severity vulnerability due to its potential impact on user authentication.
To fix CVE-2024-5918, update your PAN-OS software to version 11.0.4 or later, 10.2.5-h5, or 10.1.12.
CVE-2024-5918 affects Palo Alto Networks PAN-OS, Cloud NGFW, and Prisma Access if running specified vulnerable versions.
Exploitation of CVE-2024-5918 allows an unauthorized user to impersonate legitimate users by using a specially crafted client certificate.
Organizations using affected Palo Alto Networks products should prioritize addressing CVE-2024-5918 to protect user authentication integrity.