Vulnerability CVE-2012-6606


Published: 2013-08-31

Description:
Palo Alto Networks GlobalProtect before 1.1.7, and NetConnect, does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof portal servers and obtain sensitive information via a crafted certificate.

See advisories in our WLB2 database:
Topic
Author
Date
High
FTP Rush 2.1.8 X.509 Validation
Micha Borrmann
21.05.2014

Type:

CWE-310

(Cryptographic Issues)

Vendor: Altaware
Product: Palo alto networks globalprotect 
Version: 1.1.6;
Product: Palo alto networks netconnect 
Vendor: Paloaltonetworks
Product: Globalprotect 
Version: 1.1.6;
Product: Netconnect 

CVSS2 => (AV:N/AC:M/Au:N/C:P/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5.8/10
4.9/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
None

 References:
https://securityadvisories.paloaltonetworks.com/Home/Detail/18
http://archives.neohapsis.com/archives/bugtraq/2012-10/0100.html

Related CVE
CVE-2019-1568
Cross-site scripting (XSS) vulnerability in Palo Alto Networks Demisto 4.5 build 40249 may allow an unauthenticated attacker to run arbitrary JavaScript or HTML.
CVE-2019-1574
Cross-site scripting (XSS) vulnerability in Palo Alto Networks Expedition Migration tool 1.1.12 and earlier may allow an authenticated attacker to run arbitrary JavaScript or HTML in the Devices View.
CVE-2019-1573
GlobalProtect Agent 4.1.0 for Windows and GlobalProtect Agent 4.1.10 and earlier for macOS may allow an attacker to access authentication and/or session tokens and replay them to spoof the VPN session and gain access as the user.
CVE-2019-1567
The Expedition Migration tool 1.1.6 and earlier may allow an authenticated attacker to run arbitrary JavaScript or HTML in the User Mapping Settings.
CVE-2019-1572
PAN-OS 9.0.0 may allow an unauthenticated remote user to access php files.
CVE-2019-1571
The Expedition Migration tool 1.1.8 and earlier may allow an authenticated attacker to run arbitrary JavaScript or HTML in the RADIUS server settings.
CVE-2019-1570
The Expedition Migration tool 1.1.8 and earlier may allow an authenticated attacker to run arbitrary JavaScript or HTML in the LDAP server settings.
CVE-2019-1569
The Expedition Migration tool 1.1.8 and earlier may allow an authenticated attacker to run arbitrary JavaScript or HTML in the User Mapping Settings for account name of admin user.

Copyright 2019, cxsecurity.com

 

Back to Top