PAN-OS: Session Fixation Vulnerability in GlobalProtect SAML Login
When configured using SAML, a session fixation vulnerability in the GlobalProtect™ login enables an attacker to impersonate a legitimate authorized user and perform actions as that GlobalProtect user. This requires the legitimate user to first click on a malicious link provided by the attacker.
The SAML login for the PAN-OS® management interface is not affected. Additionally, this issue does not affect Cloud NGFW and all Prisma® Access instances are proactively patched.
Problem Types
| Type | CWE ID | Description |
|---|
| CWE | CWE-384 | CWE-384 Session Fixation |
Type: CWE
Description: CWE-384 Session Fixation
Metrics
| Version | Base score | Base severity | Vector |
|---|
| 4.0 | 8.3 | HIGH | CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:H/SC:H/SI:N/SA:N/AU:N/R:U/V:D/RE:M/U:Amber |
Version: 4.0
Base score: 8.3
Base severity: HIGH
Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:H/SC:H/SI:N/SA:N/AU:N/R:U/V:D/RE:M/U:Amber
Impacts
| CAPEC ID | Description |
|---|
| CAPEC-195 | CAPEC-195 Principal Spoof |
Description: CAPEC-195 Principal Spoof
Timeline
| Event | Date |
|---|
| Initial Publication | 2025-04-09 16:00:00 |
Event: Initial Publication
Date: 2025-04-09 16:00:00