mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
227 lines
13 KiB
JSON
227 lines
13 KiB
JSON
{
|
|
"data_version": "4.0",
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2025-0118",
|
|
"ASSIGNER": "psirt@paloaltonetworks.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "A vulnerability in the Palo Alto Networks GlobalProtect app on Windows allows a remote attacker to run ActiveX controls within the context of an authenticated Windows user. This enables the attacker to run commands as if they are a legitimate authenticated user. However, to exploit this vulnerability, the authenticated user must navigate to a malicious page during the GlobalProtect SAML login process on a Windows device.\n\nThis issue does not apply to the GlobalProtect app on other (non-Windows) platforms."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-618 Exposed Unsafe ActiveX Method",
|
|
"cweId": "CWE-618"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "Palo Alto Networks",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "GlobalProtect App",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "not down converted",
|
|
"x_cve_json_5_version_data": {
|
|
"versions": [
|
|
{
|
|
"changes": [
|
|
{
|
|
"at": "6.3.3",
|
|
"status": "unaffected"
|
|
}
|
|
],
|
|
"lessThan": "6.3.3",
|
|
"status": "unaffected",
|
|
"version": "6.3.0",
|
|
"versionType": "custom"
|
|
},
|
|
{
|
|
"changes": [
|
|
{
|
|
"at": "6.2.5",
|
|
"status": "unaffected"
|
|
}
|
|
],
|
|
"lessThan": "6.2.5",
|
|
"status": "affected",
|
|
"version": "6.2.0",
|
|
"versionType": "custom"
|
|
},
|
|
{
|
|
"changes": [
|
|
{
|
|
"at": "6.1.6",
|
|
"status": "unaffected"
|
|
}
|
|
],
|
|
"lessThan": "6.1.6",
|
|
"status": "affected",
|
|
"version": "6.1.0",
|
|
"versionType": "custom"
|
|
},
|
|
{
|
|
"changes": [
|
|
{
|
|
"at": "6.0.10",
|
|
"status": "unaffected"
|
|
}
|
|
],
|
|
"lessThan": "6.0.10",
|
|
"status": "affected",
|
|
"version": "6.0.0",
|
|
"versionType": "custom"
|
|
}
|
|
],
|
|
"defaultStatus": "unaffected"
|
|
}
|
|
},
|
|
{
|
|
"version_value": "not down converted",
|
|
"x_cve_json_5_version_data": {
|
|
"versions": [
|
|
{
|
|
"changes": [
|
|
{
|
|
"at": "6.3.3",
|
|
"status": "unaffected"
|
|
}
|
|
],
|
|
"lessThan": "6.3.3",
|
|
"status": "unaffected",
|
|
"version": "All",
|
|
"versionType": "custom"
|
|
}
|
|
],
|
|
"defaultStatus": "unaffected"
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "GlobalProtect UWP App",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "not down converted",
|
|
"x_cve_json_5_version_data": {
|
|
"versions": [
|
|
{
|
|
"status": "unaffected",
|
|
"version": "All",
|
|
"versionType": "custom"
|
|
}
|
|
],
|
|
"defaultStatus": "unaffected"
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://security.paloaltonetworks.com/CVE-2025-0118",
|
|
"refsource": "MISC",
|
|
"name": "https://security.paloaltonetworks.com/CVE-2025-0118"
|
|
}
|
|
]
|
|
},
|
|
"generator": {
|
|
"engine": "Vulnogram 0.1.0-dev"
|
|
},
|
|
"source": {
|
|
"defect": [
|
|
"GPC-19859"
|
|
],
|
|
"discovery": "EXTERNAL"
|
|
},
|
|
"configuration": [
|
|
{
|
|
"lang": "en",
|
|
"supportingMedia": [
|
|
{
|
|
"base64": false,
|
|
"type": "text/html",
|
|
"value": "You are vulnerable to this issue only if you configured GlobalProtect authentication to use SAML authentication.<br><br>You can verify whether you configured SAML authentication on your GlobalProtect portals by checking your firewall web interface (<b>Network</b> > <b>GlobalProtect</b> > <b>Portals</b> > (portal-config) > <b>Authentication</b>)."
|
|
}
|
|
],
|
|
"value": "You are vulnerable to this issue only if you configured GlobalProtect authentication to use SAML authentication.\n\nYou can verify whether you configured SAML authentication on your GlobalProtect portals by checking your firewall web interface (Network > GlobalProtect > Portals > (portal-config) > Authentication)."
|
|
}
|
|
],
|
|
"work_around": [
|
|
{
|
|
"lang": "en",
|
|
"supportingMedia": [
|
|
{
|
|
"base64": false,
|
|
"type": "text/html",
|
|
"value": "You can mitigate this issue by using a different form of authentication for the GlobalProtect portal such as Client Certificate Authentication, RADIUS, TACACS+, LDAP, or Kerberos. You can find information about configuring authentication for the GlobalProtect portal in this <a target=\"_blank\" rel=\"nofollow\" href=\"https://docs.paloaltonetworks.com/pan-os/11-1/pan-os-web-interface-help/globalprotect/network-globalprotect-portals/globalprotect-portals-authentication-configuration-tab\">documentation</a>."
|
|
}
|
|
],
|
|
"value": "You can mitigate this issue by using a different form of authentication for the GlobalProtect portal such as Client Certificate Authentication, RADIUS, TACACS+, LDAP, or Kerberos. You can find information about configuring authentication for the GlobalProtect portal in this documentation https://docs.paloaltonetworks.com/pan-os/11-1/pan-os-web-interface-help/globalprotect/network-globalprotect-portals/globalprotect-portals-authentication-configuration-tab ."
|
|
}
|
|
],
|
|
"exploit": [
|
|
{
|
|
"lang": "en",
|
|
"supportingMedia": [
|
|
{
|
|
"base64": false,
|
|
"type": "text/html",
|
|
"value": "Palo Alto Networks is not aware of any malicious exploitation of this issue."
|
|
}
|
|
],
|
|
"value": "Palo Alto Networks is not aware of any malicious exploitation of this issue."
|
|
}
|
|
],
|
|
"solution": [
|
|
{
|
|
"lang": "eng",
|
|
"supportingMedia": [
|
|
{
|
|
"base64": false,
|
|
"type": "text/html",
|
|
"value": "The issue is addressed by hardening the browser embedded in GlobalProtect app to disallow ActiveX plugins. This security enhancement is implemented in patched versions of the GlobalProtect app, so upgrading resolves the issue. <br><br><table><thead><tr><th>Version<br></th><th>Suggested Solution<br></th></tr></thead><tbody><tr><td>GlobalProtect App 6.3 on Windows<br></td><td>Upgrade to 6.3.3 or later<br></td></tr><tr><td>GlobalProtect App 6.2 on Windows<br></td><td>Upgrade to 6.2.5 or later<br></td></tr><tr><td>GlobalProtect App 6.1 on Windows</td><td>Upgrade to 6.1.6 or later<br></td></tr><tr><td>GlobalProtect App 6.0 on Windows<br></td><td>Upgrade to 6.0.10 or later<br></td></tr><tr><td>GlobalProtect App on macOS</td><td>No action needed</td></tr><tr><td>GlobalProtect App on Linux</td><td>No action needed</td></tr><tr><td>GlobalProtect App on iOS</td><td>No action needed</td></tr><tr><td>GlobalProtect App on Android</td><td>No action needed</td></tr><tr><td>GlobalProtect UWP App</td><td>No action needed</td></tr></tbody></table>"
|
|
}
|
|
],
|
|
"value": "The issue is addressed by hardening the browser embedded in GlobalProtect app to disallow ActiveX plugins. This security enhancement is implemented in patched versions of the GlobalProtect app, so upgrading resolves the issue.\u00a0\n\nVersion\nSuggested Solution\nGlobalProtect App 6.3 on Windows\nUpgrade to 6.3.3 or later\nGlobalProtect App 6.2 on Windows\nUpgrade to 6.2.5 or later\nGlobalProtect App 6.1 on WindowsUpgrade to 6.1.6 or later\nGlobalProtect App 6.0 on Windows\nUpgrade to 6.0.10 or later\nGlobalProtect App on macOSNo action neededGlobalProtect App on LinuxNo action neededGlobalProtect App on iOSNo action neededGlobalProtect App on AndroidNo action neededGlobalProtect UWP AppNo action needed"
|
|
}
|
|
],
|
|
"credits": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Maxime ESCOURBIAC, Michelin CERT"
|
|
},
|
|
{
|
|
"lang": "en",
|
|
"value": "Yassine BENGANA, Abicom for Michelin CERT"
|
|
}
|
|
]
|
|
} |