Vulnerability Description
GlobalProtect Agent 4.1.0 for Windows and GlobalProtect Agent 4.1.10 and earlier for macOS may allow a local authenticated attacker who has compromised the end-user account and gained the ability to inspect memory, to access authentication and/or session tokens and replay them to spoof the VPN session and gain access as the user.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Paloaltonetworks | Globalprotect | <= 4.1.0 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/107868Third Party AdvisoryVDB Entry
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0005Third Party Advisory
- https://security.paloaltonetworks.com/CVE-2019-1573Vendor Advisory
- https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brThird Party Advisory
- https://www.kb.cert.org/vuls/id/192371Third Party AdvisoryUS Government Resource
- http://www.securityfocus.com/bid/107868Third Party AdvisoryVDB Entry
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0005Third Party Advisory
- https://security.paloaltonetworks.com/CVE-2019-1573Vendor Advisory
- https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brThird Party Advisory
- https://www.kb.cert.org/vuls/id/192371Third Party AdvisoryUS Government Resource
FAQ
What is CVE-2019-1573?
CVE-2019-1573 is a vulnerability with a CVSS score of 2.5 (LOW). GlobalProtect Agent 4.1.0 for Windows and GlobalProtect Agent 4.1.10 and earlier for macOS may allow a local authenticated attacker who has compromised the end-user account and gained the ability to i...
How severe is CVE-2019-1573?
CVE-2019-1573 has been rated LOW with a CVSS base score of 2.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-1573?
Check the references section above for vendor advisories and patch information. Affected products include: Paloaltonetworks Globalprotect.