{"containers":{"cna":{"affected":[{"platforms":["Windows"],"product":"GlobalProtect Agent","vendor":"Palo Alto Networks","versions":[{"changes":[{"at":"4.1.1","status":"unaffected"}],"lessThanOrEqual":"4.1.0","status":"affected","version":"4.1","versionType":"custom"}]},{"platforms":["OS X"],"product":"GlobalProtect Agent","vendor":"Palo Alto Networks","versions":[{"lessThan":"4.1*","status":"unaffected","version":"4.1.11","versionType":"custom"}]}],"datePublic":"2019-04-09T00:00:00.000Z","descriptions":[{"lang":"en","value":"GlobalProtect Agent 4.1.0 for Windows and GlobalProtect Agent 4.1.10 and earlier for macOS may allow a local authenticated attacker who has compromised the end-user account and gained the ability to inspect memory, to access authentication and/or session tokens and replay them to spoof the VPN session and gain access as the user."}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"LOCAL","availabilityImpact":"NONE","baseScore":2.5,"baseSeverity":"LOW","confidentialityImpact":"LOW","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-226","description":"CWE-226 Sensitive Information Uncleared Before Release","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2020-04-09T13:29:41.000Z","orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto"},"references":[{"name":"VU#192371","tags":["third-party-advisory","x_refsource_CERT-VN"],"url":"https://www.kb.cert.org/vuls/id/192371"},{"name":"107868","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/107868"},{"tags":["x_refsource_CONFIRM"],"url":"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0005"},{"tags":["x_refsource_CONFIRM"],"url":"https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2019-783"},{"tags":["x_refsource_CONFIRM"],"url":"https://security.paloaltonetworks.com/CVE-2019-1573"}],"solutions":[{"lang":"en","value":"This issue is fixed in GlobalProtect Agent 4.1.1 and later for Windows, and GlobalProtect Agent 4.1.11 and later for macOS."}],"source":{"discovery":"EXTERNAL"},"title":"Information Disclosure in GlobalProtect Agent","x_generator":{"engine":"Vulnogram 0.0.9"},"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"psirt@paloaltonetworks.com","DATE_PUBLIC":"2019-04-09T17:45:00.000Z","ID":"CVE-2019-1573","STATE":"PUBLIC","TITLE":"Information Disclosure in GlobalProtect Agent"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"GlobalProtect Agent","version":{"version_data":[{"platform":"Windows","version_affected":"<=","version_name":"4.1","version_value":"4.1.0"},{"platform":"Windows","version_affected":"!>=","version_name":"4.1","version_value":"4.1.1"},{"platform":"OS X","version_affected":"!>=","version_name":"4.1","version_value":"4.1.11"},{"platform":"OS X","version_affected":"<=","version_name":"4.1","version_value":"4.1.10 +1"}]}}]},"vendor_name":"Palo Alto Networks"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"GlobalProtect Agent 4.1.0 for Windows and GlobalProtect Agent 4.1.10 and earlier for macOS may allow a local authenticated attacker who has compromised the end-user account and gained the ability to inspect memory, to access authentication and/or session tokens and replay them to spoof the VPN session and gain access as the user."}]},"generator":{"engine":"Vulnogram 0.0.9"},"impact":{"cvss":{"attackComplexity":"HIGH","attackVector":"LOCAL","availabilityImpact":"NONE","baseScore":2.5,"baseSeverity":"LOW","confidentialityImpact":"LOW","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-226 Sensitive Information Uncleared Before Release"}]}]},"references":{"reference_data":[{"name":"VU#192371","refsource":"CERT-VN","url":"https://www.kb.cert.org/vuls/id/192371"},{"name":"107868","refsource":"BID","url":"http://www.securityfocus.com/bid/107868"},{"name":"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0005","refsource":"CONFIRM","url":"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0005"},{"name":"https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2019-783","refsource":"CONFIRM","url":"https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2019-783"},{"name":"https://security.paloaltonetworks.com/CVE-2019-1573","refsource":"CONFIRM","url":"https://security.paloaltonetworks.com/CVE-2019-1573"}]},"solution":[{"lang":"en","value":"This issue is fixed in GlobalProtect Agent 4.1.1 and later for Windows, and GlobalProtect Agent 4.1.11 and later for macOS."}],"source":{"discovery":"EXTERNAL"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T18:20:28.252Z"},"title":"CVE Program Container","references":[{"name":"VU#192371","tags":["third-party-advisory","x_refsource_CERT-VN","x_transferred"],"url":"https://www.kb.cert.org/vuls/id/192371"},{"name":"107868","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/107868"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0005"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2019-783"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://security.paloaltonetworks.com/CVE-2019-1573"}]}]},"cveMetadata":{"assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","assignerShortName":"palo_alto","cveId":"CVE-2019-1573","datePublished":"2019-04-09T21:04:01.397Z","dateReserved":"2018-12-06T00:00:00.000Z","dateUpdated":"2024-09-16T19:21:01.439Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}