{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T21:23:55.933","vulnerabilities":[{"cve":{"id":"CVE-2021-3057","sourceIdentifier":"psirt@paloaltonetworks.com","published":"2021-10-13T16:15:07.783","lastModified":"2024-11-21T06:20:52.090","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A stack-based buffer overflow vulnerability exists in the Palo Alto Networks GlobalProtect app that enables a man-in-the-middle attacker to disrupt system processes and potentially execute arbitrary code with SYSTEM privileges. This issue impacts: GlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.9 on Windows; GlobalProtect app 5.2 versions earlier than GlobalProtect app 5.2.8 on Windows; GlobalProtect app 5.2 versions earlier than GlobalProtect app 5.2.8 on the Universal Windows Platform; GlobalProtect app 5.3 versions earlier than GlobalProtect app 5.3.1 on Linux."},{"lang":"es","value":"Se presenta una vulnerabilidad de desbordamiento del búfer en la región stack de la memoria en Palo Alto Networks GlobalProtect app que permite a un atacante que actúa como intermediario interrumpir los procesos del sistema y ejecutar potencialmente código arbitrario con privilegios SYSTEM. Este problema afecta: GlobalProtect app 5.1 versiones anteriores a GlobalProtect app 5.1.9 en Windows; GlobalProtect app 5.2 versiones anteriores a GlobalProtect app 5.2.8 en Windows; GlobalProtect app 5.2 versiones anteriores a GlobalProtect app 5.2.8 en la Plataforma Universal Windows; GlobalProtect app 5.3 versiones anteriores a GlobalProtect app 5.3.1 en Linux"}],"metrics":{"cvssMetricV31":[{"source":"psirt@paloaltonetworks.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.2,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:C/I:C/A:C","baseScore":9.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":8.6,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"psirt@paloaltonetworks.com","type":"Secondary","description":[{"lang":"en","value":"CWE-121"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-787"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:linux:*:*","versionStartIncluding":"5.0","versionEndIncluding":"5.0.8","matchCriteriaId":"27A40339-3816-4979-9705-2BA65C4485A3"},{"vulnerable":true,"criteria":"cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:macos:*:*","versionStartIncluding":"5.0","versionEndIncluding":"5.0.9","matchCriteriaId":"135DF658-334F-488A-AF89-F6655F55553A"},{"vulnerable":true,"criteria":"cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:windows:*:*","versionStartIncluding":"5.0","versionEndIncluding":"5.0.10","matchCriteriaId":"0E7CFF6E-3351-4E89-9CAA-FDE41CCF6C4F"},{"vulnerable":true,"criteria":"cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:linux:*:*","versionStartIncluding":"5.1","versionEndIncluding":"5.1.1","matchCriteriaId":"4658EFFB-74B9-4EE1-9044-060A109366A5"},{"vulnerable":true,"criteria":"cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:universal_windows_platform:*:*","versionStartIncluding":"5.1","versionEndIncluding":"5.1.1","matchCriteriaId":"511996AA-C9AE-4B0B-8A95-3A6ABECC89A1"},{"vulnerable":true,"criteria":"cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:windows:*:*","versionStartIncluding":"5.1","versionEndExcluding":"5.1.9","matchCriteriaId":"83122FE0-55DC-4060-B553-4F7C45192ABF"},{"vulnerable":true,"criteria":"cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:macos:*:*","versionStartIncluding":"5.1.0","versionEndIncluding":"5.1.4","matchCriteriaId":"1FD9AB74-21E7-4822-A16F-A23AA110B262"},{"vulnerable":true,"criteria":"cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:linux:*:*","versionStartIncluding":"5.2","versionEndExcluding":"5.2.8","matchCriteriaId":"DDF7AE8D-C8B9-4B72-AF3E-2E5B80234A86"},{"vulnerable":true,"criteria":"cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:macos:*:*","versionStartIncluding":"5.2","versionEndExcluding":"5.2.8","matchCriteriaId":"E4C4A15B-CCEB-4663-9836-B11D13CA03B9"},{"vulnerable":true,"criteria":"cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:universal_windows_platform:*:*","versionStartIncluding":"5.2","versionEndExcluding":"5.2.8","matchCriteriaId":"C099E60F-55FE-4A36-88FC-C84E6B46E752"},{"vulnerable":true,"criteria":"cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:windows:*:*","versionStartIncluding":"5.2","versionEndExcluding":"5.2.8","matchCriteriaId":"694EFE3E-296B-4466-9391-C3577BC9FEE8"},{"vulnerable":true,"criteria":"cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:linux:*:*","versionStartIncluding":"5.3","versionEndExcluding":"5.3.1","matchCriteriaId":"DAD2A294-98F8-4468-9AF0-8B18FCCC49C2"},{"vulnerable":true,"criteria":"cpe:2.3:a:paloaltonetworks:globalprotect:5.0:*:*:*:*:universal_windows_platform:*:*","matchCriteriaId":"89A946DF-8E7B-41A7-A63F-E9F22D57C041"}]}]}],"references":[{"url":"https://security.paloaltonetworks.com/CVE-2021-3057","source":"psirt@paloaltonetworks.com","tags":["Vendor Advisory"]},{"url":"https://security.paloaltonetworks.com/CVE-2021-3057","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}