Vulnerability Description
GlobalProtect-openconnect versions prior to 1.4.3 are affected by incorrect access control in GPService through DBUS, GUI Application. The way GlobalProtect-Openconnect is set up enables arbitrary users to execute commands as root by submitting the `--script=<script>` parameter.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Globalprotect-Openconnect Project | Globalprotect-Openconnect | < 1.4.3 |
References
- https://github.com/yuezk/GlobalProtect-openconnect/issues/113ExploitIssue TrackingMitigation
- https://github.com/yuezk/GlobalProtect-openconnect/issues/113ExploitIssue TrackingMitigation
FAQ
What is CVE-2021-45809?
CVE-2021-45809 is a vulnerability with a CVSS score of 9.8 (CRITICAL). GlobalProtect-openconnect versions prior to 1.4.3 are affected by incorrect access control in GPService through DBUS, GUI Application. The way GlobalProtect-Openconnect is set up enables arbitrary use...
How severe is CVE-2021-45809?
CVE-2021-45809 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2021-45809?
Check the references section above for vendor advisories and patch information. Affected products include: Globalprotect-Openconnect Project Globalprotect-Openconnect.