search menu icon-carat-right cmu-wordmark

CERT Coordination Center

VPN applications insecurely store session cookies

Vulnerability Note VU#192371

Original Release Date: 2019-04-11 | Last Revised: 2019-04-24

Overview

Multiple Virtual Private Network (VPN) applications store the authentication and/or session cookies insecurely in memory and/or log files.

Description

Virtual Private Networks (VPNs) are used to create a secure connection with another network over the internet. Multiple VPN applications store the authentication and/or session cookies insecurely in memory and/or log files.

CWE-311: Missing Encryption of Sensitive Data
The following products and versions store the cookie insecurely in log files:
- CVE-2019-1573: Palo Alto Networks GlobalProtect Agent 4.1.0 for Windows and GlobalProtect Agent 4.1.10 and earlier for macOS0
- CVE-2019-11213: Pulse Desktop Client 9.0R2 and earlier and 5.3R6 and earlier; Pulse Connect Secure (for Network Connect customers) 9.0R2 and earlier, 8.3R6 and earlier, and 8.1R13 and earlier

The following products and versions store the cookie insecurely in memory:
- CVE-2019-1573: Palo Alto Networks GlobalProtect Agent 4.1.0 for Windows and GlobalProtect Agent 4.1.10 and earlier for macOS0
- CVE-2019-11213: Pulse Desktop Client 9.0R2 and earlier and 5.3R6 and earlier; Pulse Connect Secure (for Network Connect customers) 9.0R2 and earlier, 8.3R6 and earlier, and 8.1R13 and earlier
- Cisco AnyConnect 4.7.x and prior

It is likely that this configuration is generic to additional VPN applications. If you believe that your organization is vulnerable, please contact CERT/CC at cert@cert.org with the affected products, version numbers, patch information, and self-assigned CVE.

Impact

If an attacker has persistent access to a VPN user's endpoint or exfiltrates the cookie using other methods, they can replay the session and bypass other authentication methods. An attacker would then have access to the same applications that the user does through their VPN session.

Solution

Apply an update
CVE-2019-1573
Palo Alto Networks GlobalProtect Agent version 4.1.1 and later for Windows and GlobalProtect Agent version 4.1.11 and later for macOS patch this vulnerability.

CVE-2019-11213
Update Pulse Secure Desktop Client and Network Connect to the following versions:
Desktop Client
- Pulse Secure Desktop 9.0R3 and above
- Pulse Secure Desktop 5.3R7 and above
- Note: For Pulse Desktop Client customer, this is a client-side fix only and does not require a server-side upgrade.
Network Connect
- Pulse Connect Secure 9.0R3 and above
- Pulse Connect Secure 8.3R7 and above
- Pulse Connect Secure 8.1R14 and above

CERT/CC is unaware of any patches at the time of publishing for Cisco AnyConnect.

Vendor Information

192371
 

View all 238 vendors View less vendors


CVSS Metrics

Group Score Vector
Base 5.7 AV:L/AC:L/Au:S/C:C/I:P/A:P
Temporal 4.5 E:POC/RL:OF/RC:C
Environmental 4.5 CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND

References

Acknowledgements

Thanks to the National Defense ISAC Remote Access Working Group for reporting this vulnerability.

This document was written by Madison Oliver.

Other Information

CVE IDs: CVE-2019-1573, CVE-2019-11213
Date Public: 2019-04-10
Date First Published: 2019-04-11
Date Last Updated: 2019-04-24 15:03 UTC
Document Revision: 69

Sponsored by CISA.