Zero-Day in Palo Alto Networks GlobalProtect VPN
11/16/2021

Critical vulnerability affects PAN firewalls using the GlobalProtect Portal VPN and allows for unauthenticated remote code execution on vulnerable installations of the product. The vulnerability affects PANOS 8.1 versions earlier than PAN-OS 8.1.17

  • Palo Alto Networks (PAN) patched critical zero-day CVE-2021-3064 with 9.8 CVSS score, discovered and disclosed by Randori.
  • This vulnerability affects PAN firewalls using the GlobalProtect Portal VPN and allows for unauthenticated remote code execution on vulnerable installations of the product.
  • It allows for unauthenticated RCE on multiple versions of PAN-OS 8.1 prior to 8.1.17, on both physical and virtual firewalls.
  • Randori Researchers discovered this vulnerability in 2020, but they disclosed in 22 Sep 2021 to PAN.
  • There are 10,000 internet-facing assets are vulnerable to this flaw as VPN devices are attractive targets for threat actors and Exploitation of PA-VM virtual devices in particular is made easier due to their lack of Address Space Layout Randomization (ASLR).

Sign Up Here for Download