An improper certificate validation vulnerability in Palo Alto Networks PAN-OS software enables an authorized user with a specially crafted client certificate to connect to an impacted GlobalProtect portal or GlobalProtect gateway as a different legitimate user. This attack is possible only if you "Allow Authentication with User Credentials OR Client Certificate."
References
| Link | Resource |
|---|---|
| https://security.paloaltonetworks.com/CVE-2024-5918 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
01 Oct 2025, 18:41
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.3 |
| CPE | cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h3:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h4:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h2:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:-:*:*:*:*:*:* |
|
| References | () https://security.paloaltonetworks.com/CVE-2024-5918 - Vendor Advisory | |
| First Time |
Paloaltonetworks pan-os
Paloaltonetworks |
Information
Published : 2024-11-14 10:15
Updated : 2025-10-01 18:41
NVD link : CVE-2024-5918
Mitre link : CVE-2024-5918
CVE.ORG link : CVE-2024-5918
JSON object : View
Products Affected
paloaltonetworks
- pan-os
CWE
CWE-295
Improper Certificate Validation
