Информационная безопасность
[RU] switch to English

Дополнительная информация

  Недостаточная проверка сертификата в Palo Alto Networks GlobalProtect

From:Micha.Borrmann_(at)_SySS.de <Micha.Borrmann_(at)_SySS.de>
Date:22 октября 2012 г.
Subject:MitM-vulnerability in Palo Alto Networks GlobalProtect

SySS-Advisory: MitM-vulnerability in Palo Alto Networks GlobalProtect

Problem discovered:             July         12th 2012
Vendor contacted:               July            13th 2012
Advisory published:             October         12th 2012

AUTHOR: Micha Borrmann ([email protected])
       SySS GmbH
       D-72070 Tuebingen / Germany

APPLICATION:            Windows Client
AFFECTED VERSION:       1.1.5-5 (32 Bit Version)
Remotely exploitable:   Yes


A User can not recognize an easy to perform man-in-the-middle attack,
because the client is not validate the X.509 certificate from the VPN
gateway. In an untrusted networking environment (like a Wifi hotspot),
the current VPN connection should be classified as not encrypted.

VENDOR STATUS: The vendor published a fixed version (1.1.7) at 10/12/12.

All users should update the clients soon.

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород