
The problematic code is not reachable externally without utilizing an HTTP smuggling technique. “CVE-2021-3064 is a buffer overflow that occurs while parsing user-supplied input into a fixed-length location on the stack.

Palo Alto Networks is not aware of any attack in the wild exploiting this vulnerability. The vulnerability was discovered by researchers from Randori.

The vulnerability affects PAN-OS 8.1 versions earlier than PAN-OS 8.1.17, it received a CVSS v3.1 base score of 9.8. The attacker must have network access to the GlobalProtect interface to exploit this issue.” reads the advisory published by Palo Alto Networks. “A memory corruption vulnerability exists in Palo Alto Networks GlobalProtect portal and gateway interfaces that enables an unauthenticated network-based attacker to disrupt system processes and potentially execute arbitrary code with root privileges. Successful exploitation can lead to the disruption of system processes and to the potential execution of arbitrary code with root privileges. The cybersecurity vendor warns that the vulnerability is easily exploitable by an unauthenticated network-based attacker. Palo Alto Networks disclosed a critical remote code execution vulnerability, tracked as CVE-2021-3064, in its GlobalProtect portal and gateway interfaces. Palo Alto Networks warns of an easy exploitable Remote Code Execution vulnerability in its GlobalProtect VPN product.
