Vulnerabilities > Paloaltonetworks > Globalprotect > Medium

DATE CVE VULNERABILITY TITLE RISK
2023-04-12 CVE-2023-0006 Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Paloaltonetworks Globalprotect
A local file deletion vulnerability in the Palo Alto Networks GlobalProtect app on Windows devices enables a user to delete system files from the endpoint with elevated privileges through a race condition.
local
high complexity
paloaltonetworks CWE-367
6.3
2022-02-10 CVE-2022-0018 Information Exposure vulnerability in Paloaltonetworks Globalprotect
An information exposure vulnerability exists in the Palo Alto Networks GlobalProtect app on Windows and MacOS where the credentials of the local user account are sent to the GlobalProtect portal when the Single Sign-On feature is enabled in the GlobalProtect portal configuration.
network
low complexity
paloaltonetworks CWE-200
6.5
2022-02-10 CVE-2022-0019 Insufficiently Protected Credentials vulnerability in Paloaltonetworks Globalprotect
An insufficiently protected credentials vulnerability exists in the Palo Alto Networks GlobalProtect app on Linux that exposes the hashed credentials of GlobalProtect users that saved their password during previous GlobalProtect app sessions to other local users on the system.
local
low complexity
paloaltonetworks CWE-522
5.5
2022-02-10 CVE-2022-0021 Information Exposure Through Log Files vulnerability in Paloaltonetworks Globalprotect
An information exposure through log file vulnerability exists in the Palo Alto Networks GlobalProtect app on Windows that logs the cleartext credentials of the connecting GlobalProtect user when authenticating using Connect Before Logon feature.
local
low complexity
paloaltonetworks CWE-532
5.5
2020-06-10 CVE-2020-2033 Authentication Bypass by Spoofing vulnerability in Paloaltonetworks Globalprotect
When the pre-logon feature is enabled, a missing certification validation in Palo Alto Networks GlobalProtect app can disclose the pre-logon authentication cookie to a man-in-the-middle attacker on the same local area network segment with the ability to manipulate ARP or to conduct ARP spoofing attacks.
high complexity
paloaltonetworks CWE-290
5.3
2020-05-13 CVE-2020-2004 Information Exposure Through Log Files vulnerability in Paloaltonetworks Globalprotect
Under certain circumstances a user's password may be logged in cleartext in the PanGPS.log diagnostic file when logs are collected for troubleshooting on GlobalProtect app (also known as GlobalProtect Agent) for MacOS and Windows.
local
low complexity
paloaltonetworks CWE-532
5.5
2020-04-08 CVE-2020-1988 Unquoted Search Path or Element vulnerability in Paloaltonetworks Globalprotect
An unquoted search path vulnerability in the Windows release of Global Protect Agent allows an authenticated local user with file creation privileges on the root of the OS disk (C:\) or to Program Files directory to gain system privileges.
local
low complexity
paloaltonetworks CWE-428
6.7
2020-02-12 CVE-2020-1976 Improper Input Validation vulnerability in Paloaltonetworks Globalprotect
A denial-of-service (DoS) vulnerability in Palo Alto Networks GlobalProtect software running on Mac OS allows authenticated local users to cause the Mac OS kernel to hang or crash.
local
low complexity
paloaltonetworks CWE-20
5.5
2019-10-16 CVE-2019-17435 Unspecified vulnerability in Paloaltonetworks Globalprotect
A Local Privilege Escalation vulnerability exists in the GlobalProtect Agent for Windows 5.0.3 and earlier, and GlobalProtect Agent for Windows 4.1.12 and earlier, in which the auto-update feature can allow for modification of a GlobalProtect Agent MSI installer package on disk before installation.
local
low complexity
paloaltonetworks
5.5
2017-12-11 CVE-2017-15870 Unspecified vulnerability in Paloaltonetworks Globalprotect 4.0.2
Palo Alto Networks GlobalProtect Agent before 4.0.3 allows attackers with administration rights on the local station to gain SYSTEM privileges via vectors involving "image path execution hijacking."
local
low complexity
paloaltonetworks
6.7