We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-8687

PAN-OS: Cleartext Exposure of GlobalProtect Portal Passcodes



Description

An information exposure vulnerability exists in Palo Alto Networks PAN-OS software that enables a GlobalProtect end user to learn both the configured GlobalProtect uninstall password and the configured disable or disconnect passcode. After the password or passcode is known, end users can uninstall, disable, or disconnect GlobalProtect even if the GlobalProtect app configuration would not normally permit them to do so.

Reserved 2024-09-11 | Published 2024-09-11 | Updated 2024-09-11 | Assigner palo_alto


MEDIUM: 6.9CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:L/SC:N/SI:N/SA:N/AU:N/R:A/V:D/RE:M/U:Amber

Problem types

CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere

Product status

Default status
unaffected

11.1.0
unaffected

11.2.0
unaffected

11.0.0 before 11.0.1
affected

10.2.0 before 10.2.4
affected

10.1.0 before 10.1.9
affected

10.0.0 before 10.0.12
affected

9.1.0 before 9.1.16
affected

9.0.0 before 9.0.17
affected

8.1.0 before 8.1.25
affected

Default status
unaffected

5.1.0 before 5.1.12
affected

5.2.0 before 5.2.13
affected

6.0.0 before 6.0.7
affected

6.1.0 before 6.1.2
affected

6.2.0 before 6.2.1
affected

6.3.0
unaffected

Default status
unaffected

All
unaffected

Default status
unaffected

10.2.0 before 10.2.9 on PAN-OS
affected

Timeline

2024-09-11:Initial publication

Credits

Claudiu Pancotan finder

References

security.paloaltonetworks.com/CVE-2024-8687

cve.org (CVE-2024-8687)

nvd.nist.gov (CVE-2024-8687)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-8687

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.