Severity
6.5MEDIUMNVD
CNA6.1
EPSS
0.3%
top 51.31%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 10
Latest updateDec 24

Description

An information exposure vulnerability exists in the Palo Alto Networks GlobalProtect app on Windows and MacOS where the credentials of the local user account are sent to the GlobalProtect portal when the Single Sign-On feature is enabled in the GlobalProtect portal configuration. This product behavior is intentional and poses no security risk when connecting to trusted GlobalProtect portals configured to use the same Single Sign-On credentials both for the local user account as well as the Globa

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:NExploitability: 2.8 | Impact: 3.6

Affected Packages3 packages

🔴Vulnerability Details

5
OSV
ext4: fix bug_on in __es_tree_search caused by bad quota inode2025-12-24
OSV
hfs: fix missing hfs_bnode_get() in __hfs_bnode_create2025-12-09
OSV
ext4: fix bug_on in __es_tree_search caused by bad boot loader inode2025-12-09
GHSA
GHSA-rvgp-9v6m-x4g4: An information exposure vulnerability exists in the Palo Alto Networks GlobalProtect app on Windows and MacOS where the credentials of the local user2022-02-11
CVEList
GlobalProtect App: Information Exposure Vulnerability When Connecting to GlobalProtect Portal With Single Sign-On Enabled2022-02-10

📋Vendor Advisories

8
Red Hat
kernel: hfs: fix missing hfs_bnode_get() in __hfs_bnode_create2025-12-09
Red Hat
kernel: scsi: qla2xxx: Synchronize the IOCB count to be in order2025-05-02
Red Hat
kernel: net, neigh: Fix null-ptr-deref in neigh_table_clear()2025-05-01
Red Hat
kernel: linux/dim: Fix divide by 0 in RDMA DIM2025-02-26
Red Hat
kernel: scsi: pm8001: Fix abort all task initialization2025-02-26
CVE-2022-0018 — Sensitive Info Insertion into Sent Data | cvebase