Due to a vulnerability, many enterprise VPN applications are storing authentication and session cookies insecurely which may allow an attacker to access authentication and/or session tokens and reuse them to spoof the VPN session and gain access as the user. This allows attackers to potentially bypass authentication.
This failure of encrypting sensitive or critical information could allow would-be attackers to intercept traffic data, read it and inject malicious code/data to perform a Man-in-the-Middle (MitM) attack.
The following products and versions store the cookie insecurely in log files:
The following products and versions store the cookie insecurely in memory:
GlobalProtect Agent for macOS 5.0 is NOT affected.
GlobalProtect Agent 4.1.11 and later for macOS
GlobalProtect Agent 4.1.1 for windows
Pulse Secure Connect Secure Point 8.1R14, 8.2, 8.3R6 or 9.0R2
Also make sure to enable two-factor authentication for all authentication processes rather than relying on simple passwords.