Rapid7 Vulnerability & Exploit Database

PAN-OS: Authentication bypass vulnerability in GlobalProtect client certificate verification

Back to Search

PAN-OS: Authentication bypass vulnerability in GlobalProtect client certificate verification

Severity
6
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:N)
Published
11/11/2020
Created
11/13/2020
Added
11/12/2020
Modified
11/26/2020

Description

An authentication bypass vulnerability exists in the GlobalProtect SSL VPN component of Palo Alto Networks PAN-OS software that allows an attacker to bypass all client certificate checks with an invalid certificate. A remote attacker can successfully authenticate as any user and gain access to restricted VPN network resources when the gateway or portal is configured to rely entirely on certificate-based authentication. Impacted features that use SSL VPN with client certificate verification are: GlobalProtect Gateway, GlobalProtect Portal, GlobalProtect Clientless VPN In configurations where client certificate verification is used in conjunction with other authentication methods, the protections added by the certificate check are ignored as a result of this issue. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.17; PAN-OS 9.0 versions earlier than PAN-OS 9.0.11; PAN-OS 9.1 versions earlier than PAN-OS 9.1.5; PAN-OS 10.0 versions earlier than PAN-OS 10.0.1.

Solution(s)

  • palo-alto-networks-pan-os-upgrade-10-0
  • palo-alto-networks-pan-os-upgrade-8-1
  • palo-alto-networks-pan-os-upgrade-9-0
  • palo-alto-networks-pan-os-upgrade-9-1

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;