Security News > 2019 > April > Enterprise VPN apps store authentication and session cookies insecurely

Enterprise VPN apps store authentication and session cookies insecurely
2019-04-12 13:51

CVE-2019-1573, a flaw that makes VPN applications store the authentication and/or session cookies insecurely (i.e. unencrypted) in memory and/or log files, affects a yet to be determined number of enterprise Virtual Private Network (VPN) applications. “If an attacker has persistent access to a VPN user’s endpoint or exfiltrates the cookie using other methods, they can replay the session and bypass other authentication methods,” Carnegie Mellon University’s CERT Coordination Center (CERT/CC) explained. “An attacker would then … More → The post Enterprise VPN apps store authentication and session cookies insecurely appeared first on Help Net Security.


News URL

http://feedproxy.google.com/~r/HelpNetSecurity/~3/x6UWcpHeVuA/

Related Vulnerability

DATE CVE VULNERABILITY TITLE RISK
2019-04-09 CVE-2019-1573 Missing Encryption of Sensitive Data vulnerability in Paloaltonetworks Globalprotect 4.1.0/4.1.10
GlobalProtect Agent 4.1.0 for Windows and GlobalProtect Agent 4.1.10 and earlier for macOS may allow a local authenticated attacker who has compromised the end-user account and gained the ability to inspect memory, to access authentication and/or session tokens and replay them to spoof the VPN session and gain access as the user.
local
high complexity
paloaltonetworks CWE-311
2.5