Vulnerability Name:

CVE-2021-3057 (CCN-211375)

Assigned:2020-06-10
Published:2020-06-10
Updated:2021-10-20
Summary:A stack-based buffer overflow vulnerability exists in the Palo Alto Networks GlobalProtect app that enables a man-in-the-middle attacker to disrupt system processes and potentially execute arbitrary code with SYSTEM privileges. This issue impacts: GlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.9 on Windows; GlobalProtect app 5.2 versions earlier than GlobalProtect app 5.2.8 on Windows; GlobalProtect app 5.2 versions earlier than GlobalProtect app 5.2.8 on the Universal Windows Platform; GlobalProtect app 5.3 versions earlier than GlobalProtect app 5.3.1 on Linux.
CVSS v3 Severity:8.1 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)
7.1 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
8.1 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)
7.1 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
7.6 High (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-787
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2021-3057

Source: XF
Type: UNKNOWN
paloalto-cve20213057-bo(211375)

Source: CCN
Type: Palo Alto Networks Security Advisories
CVE-2021-3057 GlobalProtect App: Buffer Overflow Vulnerability When Connecting to Portal or Gateway

Source: CONFIRM
Type: Vendor Advisory
N/A

Vulnerable Configuration:Configuration 1:
  • cpe:/a:paloaltonetworks:globalprotect:*:*:*:*:*:linux:*:* (Version >= 5.0 and <= 5.0.8)
  • OR cpe:/a:paloaltonetworks:globalprotect:*:*:*:*:*:macos:*:* (Version >= 5.0 and <= 5.0.9)
  • OR cpe:/a:paloaltonetworks:globalprotect:*:*:*:*:*:windows:*:* (Version >= 5.0 and <= 5.0.10)
  • OR cpe:/a:paloaltonetworks:globalprotect:5.0:*:*:*:*:universal_windows_platform:*:*
  • OR cpe:/a:paloaltonetworks:globalprotect:*:*:*:*:*:linux:*:* (Version >= 5.1 and <= 5.1.1)
  • OR cpe:/a:paloaltonetworks:globalprotect:*:*:*:*:*:universal_windows_platform:*:* (Version >= 5.1 and <= 5.1.1)
  • OR cpe:/a:paloaltonetworks:globalprotect:*:*:*:*:*:windows:*:* (Version >= 5.1 and < 5.1.9)
  • OR cpe:/a:paloaltonetworks:globalprotect:*:*:*:*:*:macos:*:* (Version >= 5.1.0 and <= 5.1.4)
  • OR cpe:/a:paloaltonetworks:globalprotect:*:*:*:*:*:linux:*:* (Version >= 5.2 and < 5.2.8)
  • OR cpe:/a:paloaltonetworks:globalprotect:*:*:*:*:*:macos:*:* (Version >= 5.2 and < 5.2.8)
  • OR cpe:/a:paloaltonetworks:globalprotect:*:*:*:*:*:universal_windows_platform:*:* (Version >= 5.2 and < 5.2.8)
  • OR cpe:/a:paloaltonetworks:globalprotect:*:*:*:*:*:windows:*:* (Version >= 5.2 and < 5.2.8)
  • OR cpe:/a:paloaltonetworks:globalprotect:*:*:*:*:*:linux:*:* (Version >= 5.3 and < 5.3.1)

  • * Denotes that component is vulnerable
    BACK
    paloaltonetworks globalprotect *
    paloaltonetworks globalprotect *
    paloaltonetworks globalprotect *
    paloaltonetworks globalprotect 5.0
    paloaltonetworks globalprotect *
    paloaltonetworks globalprotect *
    paloaltonetworks globalprotect *
    paloaltonetworks globalprotect *
    paloaltonetworks globalprotect *
    paloaltonetworks globalprotect *
    paloaltonetworks globalprotect *
    paloaltonetworks globalprotect *
    paloaltonetworks globalprotect *