CVE-2024-5918

4.3 MEDIUM

📋 TL;DR

An improper certificate validation vulnerability in Palo Alto Networks PAN-OS allows an authorized user with a specially crafted client certificate to connect to GlobalProtect portal/gateway as a different legitimate user. This affects systems configured to allow authentication with both user credentials AND client certificates. Only authorized users can exploit this vulnerability.

💻 Affected Systems

Products:
  • Palo Alto Networks PAN-OS
Versions: PAN-OS 11.1 versions earlier than 11.1.3, PAN-OS 11.0 versions earlier than 11.0.5-h4, PAN-OS 10.2 versions earlier than 10.2.12-h1, PAN-OS 10.1 versions earlier than 10.1.14-h4, and all versions of PAN-OS 9.1
Operating Systems: PAN-OS
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when configured with 'Allow Authentication with User Credentials OR Client Certificate' setting enabled on GlobalProtect portal or gateway.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authorized malicious insider could impersonate any legitimate user to access the GlobalProtect VPN, potentially gaining unauthorized access to internal network resources.

🟠

Likely Case

Limited privilege escalation where an authorized user gains access to resources of another user with similar privileges.

🟢

If Mitigated

No impact if proper authentication controls are in place or if the vulnerable configuration is not used.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authorized user access and ability to craft client certificates. Attack is only possible when specific authentication configuration is enabled.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: PAN-OS 11.1.3, PAN-OS 11.0.5-h4, PAN-OS 10.2.12-h1, PAN-OS 10.1.14-h4

Vendor Advisory: https://security.paloaltonetworks.com/CVE-2024-5918

Restart Required: Yes

Instructions:

1. Download appropriate PAN-OS hotfix from Palo Alto support portal. 2. Upload to firewall management interface. 3. Install hotfix. 4. Commit configuration changes. 5. Reboot firewall to complete installation.

🔧 Temporary Workarounds

Disable vulnerable authentication mode

all

Change GlobalProtect authentication configuration to use either user credentials OR client certificates, not both.

🧯 If You Can't Patch

  • Change GlobalProtect portal/gateway authentication to use either user credentials OR client certificates exclusively
  • Implement additional authentication factors or network segmentation for GlobalProtect access

🔍 How to Verify

Check if Vulnerable:

Check PAN-OS version via CLI: show system info | match sw-version. Verify if GlobalProtect portal/gateway has 'Allow Authentication with User Credentials OR Client Certificate' enabled.

Check Version:

show system info | match sw-version

Verify Fix Applied:

Verify PAN-OS version is patched: show system info | match sw-version. Confirm version matches or exceeds patched versions listed in advisory.

📡 Detection & Monitoring

Log Indicators:

  • Multiple successful authentication attempts from same client certificate for different usernames
  • Authentication logs showing certificate validation anomalies

Network Indicators:

  • Unusual VPN connection patterns from authorized users
  • Multiple user sessions originating from same client system

SIEM Query:

source="pan_logs" (event_type="authentication" AND (certificate_validation="failed" OR user_change="true"))

🔗 References

📤 Share & Export