GlobalProtect Agent 4.1.0 for Windows and GlobalProtect Agent 4.1.10 and earlier for macOS may allow a local authenticated attacker who has compromised the end-user account and gained the ability to inspect memory, to access authentication and/or session tokens and replay them to spoof the VPN session and gain access as the user.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/107868 | Third Party Advisory VDB Entry |
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0005 | Third Party Advisory |
https://security.paloaltonetworks.com/CVE-2019-1573 | Vendor Advisory |
https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2019-783 | Third Party Advisory |
https://www.kb.cert.org/vuls/id/192371 | Third Party Advisory US Government Resource |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: palo_alto
Published: 2019-04-09T00:00:00
Updated: 2020-04-09T13:29:41
Reserved: 2018-12-06T00:00:00
Link: CVE-2019-1573
JSON object: View
NVD Information
Status : Analyzed
Published: 2019-04-09T22:29:00.877
Modified: 2021-09-14T12:14:39.193
Link: CVE-2019-1573
JSON object: View
Redhat Information
No data.