CVE-2022-0018

An information exposure vulnerability exists in the Palo Alto Networks GlobalProtect app on Windows and MacOS where the credentials of the local user account are sent to the GlobalProtect portal when the Single Sign-On feature is enabled in the GlobalProtect portal configuration. This product behavior is intentional and poses no security risk when connecting to trusted GlobalProtect portals configured to use the same Single Sign-On credentials both for the local user account as well as the GlobalProtect login. However when the credentials are different, the local account credentials are inadvertently sent to the GlobalProtect portal for authentication. A third party MITM type of attacker cannot see these credentials in transit. This vulnerability is a concern where the GlobalProtect app is deployed on Bring-your-Own-Device (BYOD) type of clients with private local user accounts or GlobalProtect app is used to connect to different organizations. Fixed versions of GlobalProtect app have an app setting to prevent the transmission of the user's local user credentials to the target GlobalProtect portal regardless of the portal configuration. This issue impacts: GlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.10 on Windows and MacOS; GlobalProtect app 5.2 versions earlier than GlobalProtect app 5.2.9 on Windows and MacOS This issue does not affect GlobalProtect app on other platforms.

Publication date: Fri, 11 Feb 2022 00:15:00 +0000


Cyber News related to CVE-2022-0018

CVE-2022-48919 - In the Linux kernel, the following vulnerability has been resolved: ...
6 months ago
CVE-2022-29277 - Incorrect pointer checks within the the FwBlockServiceSmm driver can allow arbitrary RAM modifications During review of the FwBlockServiceSmm driver, certain instances of SpiAccessLib could be tricked into writing 0xff to arbitrary system and SMRAM ...
2 years ago
CVE-2024-26700 - In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix MST Null Ptr for RV The change try to fix below error specific to RV platform: BUG: kernel NULL pointer dereference, address: 0000000000000008 PGD 0 P4D 0 Oops: ...
1 year ago Tenable.com
CVE-2022-49096 - In the Linux kernel, the following vulnerability has been resolved: ...
3 months ago
CVE-2022-48781 - In the Linux kernel, the following vulnerability has been resolved: ...
6 months ago
CVE-2022-50116 - In the Linux kernel, the following vulnerability has been resolved: ...
3 days ago
CVE-2021-47271 - In the Linux kernel, the following vulnerability has been resolved: ...
1 year ago
CVE-2024-50095 - In the Linux kernel, the following vulnerability has been resolved: RDMA/mad: Improve handling of timed out WRs of mad agent Current timeout handler of mad agent acquires/releases mad_agent_priv lock for every timed out WRs. This causes heavy locking ...
7 months ago Tenable.com
CVE-2023-52435 - In the Linux kernel, the following vulnerability has been resolved: ...
1 year ago
CVE-2024-40914 - In the Linux kernel, the following vulnerability has been resolved: ...
6 months ago
CVE-2023-52570 - In the Linux kernel, the following vulnerability has been resolved: ...
1 year ago
CVE-2023-52580 - In the Linux kernel, the following vulnerability has been resolved: net/core: Fix ETH_P_1588 flow dissector When a PTP ethernet raw frame with a size of more than 256 bytes followed by a 0xff pattern is sent to __skb_flow_dissect, nhoff value ...
1 year ago Tenable.com
CVE-2021-47100 - In the Linux kernel, the following vulnerability has been resolved: ...
1 year ago
CVE-2024-26867 - In the Linux kernel, the following vulnerability has been resolved: comedi: comedi_8255: Correct error in subdevice initialization The refactoring done in commit 5c57b1ccecc7 ("comedi: comedi_8255: Rework subdevice initialization functions") to the ...
1 year ago Tenable.com
CVE-2023-52648 - In the Linux kernel, the following vulnerability has been resolved: ...
1 year ago
CVE-2023-52782 - In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Track xmit submission to PTP WQ after populating metadata map Ensure the skb is available in metadata mapping to skbs before tracking the metadata index for detecting ...
1 year ago Tenable.com
CVE-2024-36028 - In the Linux kernel, the following vulnerability has been resolved: ...
1 year ago
CVE-2021-47595 - In the Linux kernel, the following vulnerability has been resolved: ...
7 months ago
CVE-2024-46763 - In the Linux kernel, the following vulnerability has been resolved: ...
9 months ago
CVE-2024-46721 - In the Linux kernel, the following vulnerability has been resolved: apparmor: fix possible NULL pointer dereference profile->parent->dents[AAFS_PROF_DIR] could be NULL only if its parent is made from __create_missing_ancestors(..) and 'ent->old' is ...
9 months ago Tenable.com
CVE-2024-49932 - In the Linux kernel, the following vulnerability has been resolved: btrfs: don't readahead the relocation inode on RST On relocation we're doing readahead on the relocation inode, but if the filesystem is backed by a RAID stripe tree we can get ...
7 months ago Tenable.com
CVE-2024-47707 - In the Linux kernel, the following vulnerability has been resolved: ipv6: avoid possible NULL deref in rt6_uncached_list_flush_dev() Blamed commit accidentally removed a check for rt->rt6i_idev being NULL, as spotted by syzbot: Oops: general ...
8 months ago Tenable.com
CVE-2024-43874 - In the Linux kernel, the following vulnerability has been resolved: ...
6 months ago
CVE-2023-52889 - In the Linux kernel, the following vulnerability has been resolved: ...
6 months ago
CVE-2024-40923 - In the Linux kernel, the following vulnerability has been resolved: ...
6 months ago