CVE-2024-8691

7.1 HIGH

📋 TL;DR

This vulnerability allows an authenticated GlobalProtect user to impersonate another GlobalProtect user, disconnecting the legitimate user while hiding the attacker's identity in logs. It affects Palo Alto Networks PAN-OS software with GlobalProtect portal enabled. Attackers must have valid GlobalProtect credentials to exploit this.

💻 Affected Systems

Products:
  • Palo Alto Networks PAN-OS
Versions: PAN-OS 11.1 versions earlier than 11.1.3, PAN-OS 11.0 versions earlier than 11.0.5-h4, PAN-OS 10.2 versions earlier than 10.2.12-h2, and all versions of PAN-OS 10.1 and PAN-OS 9.1
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with GlobalProtect portal enabled. PAN-OS 11.1.3, 11.0.5-h4, and 10.2.12-h2 fix this vulnerability.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could impersonate administrators or privileged users, potentially gaining unauthorized access to sensitive network resources while evading detection through log manipulation.

🟠

Likely Case

Attackers impersonate regular users to access resources they shouldn't have permission for, while disrupting legitimate user VPN connections.

🟢

If Mitigated

With proper monitoring and least privilege access controls, impact is limited to temporary connection disruption for targeted users.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated GlobalProtect user access. The vulnerability is in the authentication mechanism allowing user impersonation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: PAN-OS 11.1.3, PAN-OS 11.0.5-h4, PAN-OS 10.2.12-h2

Vendor Advisory: https://security.paloaltonetworks.com/CVE-2024-8691

Restart Required: Yes

Instructions:

1. Download the appropriate PAN-OS update from the Palo Alto Networks support portal. 2. Upload the software image to your firewall. 3. Install the update following Palo Alto's upgrade procedures. 4. Reboot the firewall to complete the installation.

🔧 Temporary Workarounds

Disable GlobalProtect Portal

all

Temporarily disable the GlobalProtect portal if not required, which will prevent exploitation but also disable legitimate VPN access.

🧯 If You Can't Patch

  • Implement strict access controls and monitoring for GlobalProtect user activity
  • Enable multi-factor authentication for GlobalProtect users to reduce impact of credential compromise

🔍 How to Verify

Check if Vulnerable:

Check PAN-OS version via web interface or CLI: show system info. If version is earlier than 11.1.3, 11.0.5-h4, or 10.2.12-h2 and GlobalProtect portal is enabled, system is vulnerable.

Check Version:

show system info | match version

Verify Fix Applied:

After patching, verify PAN-OS version shows 11.1.3, 11.0.5-h4, or 10.2.12-h2 or later via show system info command.

📡 Detection & Monitoring

Log Indicators:

  • Multiple authentication events for same user from different IPs in quick succession
  • Users reporting unexpected VPN disconnections
  • Authentication logs showing user activity inconsistent with normal patterns

Network Indicators:

  • Unusual VPN connection patterns
  • Multiple connection attempts from same source to different user accounts

SIEM Query:

source="pan_logs" AND (event_type="authentication" OR event_type="vpn") | stats count by user, src_ip | where count > threshold

🔗 References

📤 Share & Export