Learn about CVE-2022-0021 impacting GlobalProtect App on Windows. Discover the information exposure vulnerability, affected versions, and mitigation steps.
An information exposure through log file vulnerability exists in the Palo Alto Networks GlobalProtect app on Windows that logs the cleartext credentials of the connecting GlobalProtect user when authenticating using Connect Before Logon feature. This impacts GlobalProtect App 5.2 versions earlier than 5.2.9 on Windows.
Understanding CVE-2022-0021
This CVE highlights an information exposure vulnerability in Palo Alto Networks' GlobalProtect app on Windows when using the Connect Before Logon feature.
What is CVE-2022-0021?
CVE-2022-0021 involves an information exposure through log file vulnerability in GlobalProtect App, which results in logging cleartext credentials of users on Windows devices.
The Impact of CVE-2022-0021
The vulnerability can lead to the exposure of sensitive user credentials, potentially compromising user privacy and security on affected Windows devices.
Technical Details of CVE-2022-0021
Vulnerability Description
The vulnerability allows the logging of cleartext credentials of GlobalProtect users on Windows devices using the Connect Before Logon feature.
Affected Systems and Versions
GlobalProtect App 5.2 versions prior to 5.2.9 on Windows are affected by this vulnerability.
Exploitation Mechanism
Palo Alto Networks has reported that there is no known malicious exploitation of this vulnerability at the moment.
Mitigation and Prevention
Immediate Steps to Take
Ensure devices are updated to GlobalProtect App 5.2.9 on Windows or later versions to mitigate the vulnerability. Avoid using Connect Before Logon feature until the app is updated.
Long-Term Security Practices
Regularly update the GlobalProtect App to the latest versions and follow Palo Alto Networks' security recommendations for optimal protection.
Patching and Updates
The issue has been addressed in GlobalProtect App version 5.2.9 on Windows and all subsequent versions are secure.