GlobalProtect Agent 4.1.0 for Windows and GlobalProtect Agent 4.1.10 and earlier for macOS may allow a local authenticated attacker who has compromised the end-user account and gained the ability to inspect memory, to access authentication and/or session tokens and replay them to spoof the VPN session and gain access as the user.
Solution:
The product releases a resource such as memory or a file so that it can be made available for reuse, but it does not clear or "zeroize" the information contained in the resource before the product performs a critical state transition or makes the resource available for reuse by other entities.
The product does not encrypt sensitive or critical information before storage or transmission.
Link | Tags |
---|---|
https://www.kb.cert.org/vuls/id/192371 | third party advisory us government resource |
http://www.securityfocus.com/bid/107868 | third party advisory vdb entry |
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0005 | third party advisory |
https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2019-783 | third party advisory |
https://security.paloaltonetworks.com/CVE-2019-1573 | vendor advisory |