Risk | Low |
Patch available | YES |
Number of vulnerabilities | 2 |
CVE-ID | CVE-2020-2032 CVE-2020-2033 |
CWE-ID | CWE-367 CWE-295 |
Exploitation vector | Local network |
Public exploit | N/A |
Vulnerable software |
GlobalProtect Agent Client/Desktop applications / Antivirus software/Personal firewalls |
Vendor | Palo Alto Networks, Inc. |
Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
Updated: 6.11.2020
Provided correct links to affected versions, fixed CWE-ID for vulnerability #1.
EUVDB-ID: #VU28965
Risk: Low
CVSSv4.0: 4.4 [CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2020-2032
CWE-ID:
CWE-367 - Time-of-check Time-of-use (TOCTOU) Race Condition
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a Time-of-check Time-of-use (TOCTOU) issue during upgrade. An local user can execute arbitrary programs with SYSTEM privileges.
MitigationInstall updates from vendor's website.
Vulnerable software versionsGlobalProtect Agent: 5.0.0 - 5.1.3
CPE2.3https://security.paloaltonetworks.com/CVE-2020-2032
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU28966
Risk: Low
CVSSv4.0: 2.3 [CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2020-2033
CWE-ID:
CWE-295 - Improper Certificate Validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a man-in-the-middle (MitM) attack.
The vulnerability exists due to a missing certification validation, when the pre-logon feature is enabled. A remote attacker on the local network can perform a MitM attack, disclose the pre-logon authentication cookie and access the GlobalProtect Server as allowed by configured Security rules for the "pre-login" user.
MitigationInstall updates from vendor's website.
Vulnerable software versionsGlobalProtect Agent: 5.0.0 - 5.1.3
CPE2.3https://security.paloaltonetworks.com/CVE-2020-2033
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.