Vulnerability Details : CVE-2021-3057
A stack-based buffer overflow vulnerability exists in the Palo Alto Networks GlobalProtect app that enables a man-in-the-middle attacker to disrupt system processes and potentially execute arbitrary code with SYSTEM privileges. This issue impacts: GlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.9 on Windows; GlobalProtect app 5.2 versions earlier than GlobalProtect app 5.2.8 on Windows; GlobalProtect app 5.2 versions earlier than GlobalProtect app 5.2.8 on the Universal Windows Platform; GlobalProtect app 5.3 versions earlier than GlobalProtect app 5.3.1 on Linux.
Vulnerability category: OverflowMemory CorruptionExecute code
Products affected by CVE-2021-3057
- Paloaltonetworks » Globalprotect » For WindowsVersions from including (>=) 5.0 and up to, including, (<=) 5.0.10cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:windows:*:*
- Paloaltonetworks » Globalprotect » For MacosVersions from including (>=) 5.0 and up to, including, (<=) 5.0.9cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:macos:*:*
- Paloaltonetworks » Globalprotect » For MacosVersions from including (>=) 5.1.0 and up to, including, (<=) 5.1.4cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:macos:*:*
- Paloaltonetworks » Globalprotect » For LinuxVersions from including (>=) 5.0 and up to, including, (<=) 5.0.8cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:linux:*:*
- Paloaltonetworks » Globalprotect » For LinuxVersions from including (>=) 5.1 and up to, including, (<=) 5.1.1cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:linux:*:*
- Paloaltonetworks » Globalprotect » For Universal Windows PlatformVersions from including (>=) 5.1 and up to, including, (<=) 5.1.1cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:universal_windows_platform:*:*
- Paloaltonetworks » Globalprotect » For WindowsVersions from including (>=) 5.2 and before (<) 5.2.8cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:windows:*:*
- Paloaltonetworks » Globalprotect » For WindowsVersions from including (>=) 5.1 and before (<) 5.1.9cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:windows:*:*
- Paloaltonetworks » Globalprotect » For Universal Windows PlatformVersions from including (>=) 5.2 and before (<) 5.2.8cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:universal_windows_platform:*:*
- cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:linux:*:*
- cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:linux:*:*
- cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:macos:*:*
- cpe:2.3:a:paloaltonetworks:globalprotect:5.0:*:*:*:*:universal_windows_platform:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-3057
0.14%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 50 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-3057
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST | |
8.1
|
HIGH | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
2.2
|
5.9
|
Palo Alto Networks, Inc. |
CWE ids for CVE-2021-3057
-
A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).Assigned by: psirt@paloaltonetworks.com (Secondary)
-
The product writes data past the end, or before the beginning, of the intended buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2021-3057
-
https://security.paloaltonetworks.com/CVE-2021-3057
CVE-2021-3057 GlobalProtect App: Buffer Overflow Vulnerability When Connecting to Portal or GatewayVendor Advisory
Jump to