Info Exposure in PAN-OS GlobalProtect Exposes Uninstall Password & Passcode
CVE-2024-8687 Published on September 11, 2024

PAN-OS: Cleartext Exposure of GlobalProtect Portal Passcodes
An information exposure vulnerability exists in Palo Alto Networks PAN-OS software that enables a GlobalProtect end user to learn both the configured GlobalProtect uninstall password and the configured disable or disconnect passcode. After the password or passcode is known, end users can uninstall, disable, or disconnect GlobalProtect even if the GlobalProtect app configuration would not normally permit them to do so.

NVD

Timeline

Initial publication

Weakness Type

Exposure of Sensitive System Information to an Unauthorized Control Sphere

The application does not properly prevent sensitive system-level information from being accessed by unauthorized actors who do not have the same level of access to the underlying system as the application does.


Products Associated with CVE-2024-8687

stack.watch emails you whenever new vulnerabilities are published in Palo Alto Networks PAN-OS or Palo Alto Networks Globalprotect. Just hit a watch button to start following.

 
 

Affected Versions

Palo Alto Networks PAN-OS: Palo Alto Networks GlobalProtect App: Palo Alto Networks Cloud NGFW: Palo Alto Networks Prisma Access:

Exploit Probability

EPSS
0.38%
Percentile
59.31%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.