Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-5908: CWE-532: Insertion of Sensitive Information into Log File in Palo Alto Networks GlobalProtect App

0
Medium
VulnerabilityCVE-2024-5908cvecve-2024-5908cwe-532
Published: Wed Jun 12 2024 (06/12/2024, 16:28:08 UTC)
Source: CVE Database V5
Vendor/Project: Palo Alto Networks
Product: GlobalProtect App

Description

CVE-2024-5908 is a medium-severity vulnerability in Palo Alto Networks GlobalProtect App versions 5. 1. 0, 6. 0. 0, 6. 1. 0, and 6. 2. 0. It involves the insertion of encrypted user credentials into application logs, which are normally accessible only to local users but may be shared during troubleshooting.

AI-Powered Analysis

AILast updated: 02/26/2026, 02:56:02 UTC

Technical Analysis

CVE-2024-5908 is a vulnerability classified under CWE-532, which pertains to the insertion of sensitive information into log files. In this case, the Palo Alto Networks GlobalProtect App, a widely used VPN client, inadvertently logs encrypted user credentials used for VPN authentication within its application logs. These logs are typically accessible only to local users on the device but are often collected and shared for troubleshooting purposes. The presence of encrypted credentials in logs increases the risk that sensitive authentication data could be exposed to unauthorized parties if logs are mishandled or transmitted insecurely. The vulnerability affects multiple versions of the GlobalProtect App (5.1.0, 6.0.0, 6.1.0, and 6.2.0). According to the CVSS 4.0 vector, the attack vector is network-based, with low attack complexity, no privileges required, but user interaction is necessary. The vulnerability impacts confidentiality primarily, with limited impact on integrity and availability. There are no known exploits in the wild at this time, and no official patches have been linked yet. The vulnerability was published on June 12, 2024, and is currently rated as medium severity with a CVSS score of 5.5.

Potential Impact

The primary impact of CVE-2024-5908 is the potential exposure of encrypted VPN credentials through application logs. If these logs are accessed by unauthorized users or shared externally during troubleshooting, attackers could gain access to sensitive authentication data. Although the credentials are encrypted, their exposure increases the risk of offline cryptanalysis or credential replay attacks, potentially leading to unauthorized VPN access. This could compromise the confidentiality of corporate networks and sensitive data accessed via GlobalProtect VPN. The vulnerability does not directly affect system integrity or availability but poses a significant confidentiality risk. Organizations relying on GlobalProtect for secure remote access could face increased risk of credential theft and subsequent network intrusion if logs are not properly secured. The risk is heightened in environments where logs are aggregated or transmitted to external support teams without adequate protection.

Mitigation Recommendations

Organizations should immediately review and restrict access to GlobalProtect application logs to trusted local users only, ensuring logs are not shared externally unless sanitized. Avoid transmitting raw logs containing sensitive information over insecure channels. Implement strict access controls and encryption for log storage and transmission. Monitor for unusual access patterns to logs and VPN authentication systems. Until Palo Alto Networks releases an official patch, consider disabling verbose logging features that capture sensitive credential data if feasible. Educate support and IT teams about the sensitivity of these logs to prevent accidental exposure. Regularly update GlobalProtect App to the latest versions once patches addressing this vulnerability are available. Additionally, consider implementing multi-factor authentication (MFA) on VPN access to mitigate risks from potential credential compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
palo_alto
Date Reserved
2024-06-12T15:27:55.490Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699f6bf6b7ef31ef0b55d12a

Added to database: 2/25/2026, 9:39:02 PM

Last enriched: 2/26/2026, 2:56:02 AM

Last updated: 2/26/2026, 8:06:48 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats