Palo Alto Networks Does Not Fully Address Vulnerability in GlobalProtect SSL VPN Solution

  /     /     /  
Publicated : 23/11/2024   Category : security


Palo Alto Networks Does Not Fully Address Vulnerability in GlobalProtect SSL VPN Solution


If Palo Alto Networks wants to keep the trust of its customers in the future, it will have to do much better in how it relates to them.



Palo Alto Networks has published an advisory about its Palo Alto GlobalProtect SSL VPN solution which is used by many organizations. The advisory was a response to
research carried out by Orange Tsai and Meh Chang
about their discovery of a pre-authentication remote code execution (RCE) vulnerability in it.
The researchers found that the vulnerability exists because the gateway passes the value of a particular parameter to snprintf in an unsanitized, therefore exploitable, fashion. An unauthenticated attacker could exploit this vulnerability by sending a specially crafted request to a vulnerable SSL VPN target in order to remotely execute code on the system.
The researchers found that, The bug is very straightforward. It is just a simple format string vulnerability with no authentication required! The sslmgr is the SSL gateway handling the SSL handshake between the server and clients. The daemon is exposed by the Nginx reverse proxy and can be touched via the path /sslmgr. During the parameter extraction, the daemon searches the string scep-profile-name and pass its value as the snprintf format to fill in the buffer. That leads to the format string attack.
Satnam Narang at
Tenable described
the problem in Tenables own blog as a format string vulnerability in the PAN SSL Gateway, which handles client/server SSL handshakes.
Though the researchers responsibly reported the problem to PAN, the company allegedly responded that the vulnerability had been identified internally and fixed. Therefore, no CVE identifier was assigned and newer versions of GlobalProtect would not be vulnerable.
After the researchers continued to investigate, PAN assigned a CVE identifier, CVE-2019-1579, and published a security advisory,
PAN-SA-2019-0020
, regarding it.
This may be related to the researchers finding that Uber was running an unpatched version and was therefore vulnerable. Their in-blog exploit worked against Uber and the researchers reported their findings. Uber responded it did not use PAN SSL VPN as its primary VPN and that PANs VPN was hosted on Amazon Web Services (AWS) and not a part of Ubers core infrastructure, which mitigated some of the potential impact of this vulnerability.
The affected systems and their updates are:
PAN-OS 7.1.18 and earlier
PAN-OS 7.1.19 and later
PAN-OS 8.0.11 and earlier
PAN-OS 8.0.12 and later
PAN-OS 8.1.2 and earlier
PAN-OS 8.1.3 and later
PAN-OS 9.0 is not affected.
The PAN advisory admits some customers can not patch or upgrade. PAN recommends updating to content release 8173, or a later version as well as ensuring threat prevention is enabled and enforced on traffic that passes through the GlobalProtect portal and GlobalProtect.
PAN tried a quick end-run around the community by not initially declaring a problem here. Just because it made internal fixes doesnt mean that these will migrate to the users that need them. The security advisory PAN issued about all of this was minimalist to the point of absurd, and unhelpful in a practical sense. If PAN wants to keep the trust of its customers in the future, it will have to do much better in how it relates to them.
— Larry Loeb has written for many of the last centurys major dead tree computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.

Last News

▸ Travel agency fined £150,000 for breaking Data Protection Act. ◂
Discovered: 23/12/2024
Category: security

▸ 7 arrested, 3 more charged in StubHub cyber fraud ring. ◂
Discovered: 23/12/2024
Category: security

▸ Nigerian scammers now turning into mediocre malware pushers. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Palo Alto Networks Does Not Fully Address Vulnerability in GlobalProtect SSL VPN Solution