Palo Alto Networks GlobalProtect 6.0.1 for Linux

CPE Details

Palo Alto Networks GlobalProtect 6.0.1 for Linux
6.0.1
2023-06-05
11h26 +00:00
2023-06-05
12h02 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:paloaltonetworks:globalprotect:6.0.1:*:*:*:*:linux:*:*

Informations

Vendor

paloaltonetworks

Product

globalprotect

Version

6.0.1

Target Software

linux

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2024-8687 2024-09-11 16h40 +00:00 An information exposure vulnerability exists in Palo Alto Networks PAN-OS software that enables a GlobalProtect end user to learn both the configured GlobalProtect uninstall password and the configured disable or disconnect passcode. After the password or passcode is known, end users can uninstall, disable, or disconnect GlobalProtect even if the GlobalProtect app configuration would not normally permit them to do so.
6.9
Moyen
CVE-2024-5908 2024-06-12 16h28 +00:00 A problem with the Palo Alto Networks GlobalProtect app can result in exposure of encrypted user credentials, used for connecting to GlobalProtect, in application logs. Normally, these application logs are only viewable by local users and are included when generating logs for troubleshooting purposes. This means that these encrypted credentials are exposed to recipients of the application logs.
5.5
Moyen
CVE-2024-3661 2024-05-06 18h31 +00:00 DHCP can add routes to a client’s routing table via the classless static route option (121). VPN-based security solutions that rely on routes to redirect traffic can be forced to leak traffic over the physical interface. An attacker on the same local network can read, disrupt, or possibly modify network traffic that was expected to be protected by the VPN.
7.6
Haute