CVE-2020-2050Improper Authorization in Palo Alto Networks Pan-os

Severity
8.2HIGHNVD
EPSS
0.2%
top 63.12%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 12
Latest updateMay 24

Description

An authentication bypass vulnerability exists in the GlobalProtect SSL VPN component of Palo Alto Networks PAN-OS software that allows an attacker to bypass all client certificate checks with an invalid certificate. A remote attacker can successfully authenticate as any user and gain access to restricted VPN network resources when the gateway or portal is configured to rely entirely on certificate-based authentication. Impacted features that use SSL VPN with client certificate verification are:

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:NExploitability: 3.9 | Impact: 4.2

Affected Packages3 packages

NVDpaloaltonetworks/pan-os8.1.08.1.17+3
CVEListV5palo_alto_networks/pan-os8.18.1.17+3
Palo Altopaloalto/pan-os

🔴Vulnerability Details

2
GHSA
GHSA-cgjw-gjmx-29p4: An authentication bypass vulnerability exists in the GlobalProtect SSL VPN component of Palo Alto Networks PAN-OS software that allows an attacker to2022-05-24
CVEList
PAN-OS: Authentication bypass vulnerability in GlobalProtect SSL VPN client certificate verification2020-11-12

💥Exploits & PoCs

1
Exploit-DB
Sherpa Connector Service v2020.2.20328.2050 - Unquoted Service Path2022-04-07

📋Vendor Advisories

1
Palo Alto
PAN-OS: Authentication bypass vulnerability in GlobalProtect client certificate verification2020-11-11
CVE-2020-2050 — Improper Authorization in Palo | cvebase