Headline
CVE-2022-0021: CVE-2022-0021 GlobalProtect App: Information Exposure Vulnerability When Using Connect Before Logon
An information exposure through log file vulnerability exists in the Palo Alto Networks GlobalProtect app on Windows that logs the cleartext credentials of the connecting GlobalProtect user when authenticating using Connect Before Logon feature.
This issue impacts GlobalProtect App 5.2 versions earlier than 5.2.9 on Windows.
This issue does not affect the GlobalProtect app on other platforms.
- Get support
- Security advisories
- Report vulnerabilities
- Subscribe
- RSS feed
Palo Alto Networks Security Advisories / CVE-2022-0021
Attack Vector LOCAL
Attack Complexity LOW
Privileges Required LOW
User Interaction NONE
Scope UNCHANGED
Confidentiality Impact LOW
Integrity Impact NONE
Availability Impact NONE
NVD JSON
Published 2022-02-09
Updated 2022-02-09
Reference GPC-13888
Discovered internally
Description
An information exposure through log file vulnerability exists in the Palo Alto Networks GlobalProtect app on Windows that logs the cleartext credentials of the connecting GlobalProtect user when authenticating using Connect Before Logon feature.
This issue impacts GlobalProtect App 5.2 versions earlier than 5.2.9 on Windows.
This issue does not affect the GlobalProtect app on other platforms.
Product Status
Versions
Affected
Unaffected
GlobalProtect App 5.3
None
5.3.*
GlobalProtect App 5.2
< 5.2.9 on Windows
>= 5.2.9 on Windows
GlobalProtect App 5.1
None
5.1.*
Required Configuration for Exposure
This issue is applicable only to devices configured to use the GlobalProtect Connect Before Logon feature.
Severity: LOW
CVSSv3.1 Base Score: 3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)
Exploitation Status
Palo Alto Networks is not aware of any malicious exploitation of this issue.
Weakness Type
CWE-532 Information Exposure Through Log Files
Solution
This issue is fixed in GlobalProtect app 5.2.9 on Windows and all later GlobalProtect app versions.
Workarounds and Mitigations
There are no known workarounds for this issue.
Acknowledgments
This issue was found by Rutger Truyers of Palo Alto Networks during internal security review.
Timeline
2022-02-09 Initial publication
© 2020 Palo Alto Networks, Inc. All rights reserved.