An improper certificate validation vulnerability in Palo Alto Networks PAN-OS software enables an authorized user with a specially crafted client certificate to connect to an impacted GlobalProtect portal or GlobalProtect gateway as a different legitimate user. This attack is possible only if you Allow Authentication with User Credentials OR Client Certificate.
The product does not validate, or incorrectly validates, a certificate.
| Name | Vendor | Start Version | End Version | 
|---|---|---|---|
| Pan-os | Paloaltonetworks | 10.1.0 (including) | 10.1.11 (excluding) | 
| Pan-os | Paloaltonetworks | 10.2.0 (including) | 10.2.4 (including) | 
| Pan-os | Paloaltonetworks | 11.0.0 (including) | 11.0.3 (excluding) | 
| Pan-os | Paloaltonetworks | 10.2.4 (including) | 10.2.4 (including) | 
| Pan-os | Paloaltonetworks | 10.2.4-h2 (including) | 10.2.4-h2 (including) | 
| Pan-os | Paloaltonetworks | 10.2.4-h3 (including) | 10.2.4-h3 (including) | 
| Pan-os | Paloaltonetworks | 10.2.4-h4 (including) | 10.2.4-h4 (including) |