Two cybersecurity researchers have publicly disclosed a remote code execution vulnerability in Palo Alto Network’s GlobalProtect Secure Socket Layer (SSL) virtual private network (VPN) that the company had previously discovered and silently patched.
Orange Tsai and Meh Chang, of DevCore Security Consulting, blogged that they came across the flaw while conducting a red team security assessment of the service. The two at first believed they had stumbled across a zero day, but quickly determined that it was a known vulnerability. They then conducted and in-depth search, but could not find a CVE or security advisory that covered the problem so they proceeded believing it was still unknown.
“The bug is very straightforward. It is just a simple format string vulnerability with no authentication required!,” they wrote.
Please register to continue.
Already registered? Log in.
Once you register, you'll receive:
The context and insight you need to stay abreast of the most important developments in cybersecurity. CISO and practitioner perspectives; strategy and tactics; solutions and innovation; policy and regulation.
Unlimited access to nearly 20 years of SC Media industry analysis and news-you-can-use.
SC Media’s essential morning briefing for cybersecurity professionals.
One-click access to our extensive program of virtual events, with convenient calendar reminders and ability to earn CISSP credits.