![]() ![]() ![]() This means that a large number of enterprise customers and clients can potentially be breached or compromised by a remote attacker if they do not update to the latest patch. ![]() The successful exploitation of a vulnerability like this can potentially lead to the complete compromise of an unpatched system running the GlobalProtect Clientless VPN application. Software vulnerabilities affecting network companies are not uncommon and are usually patched quickly to avoid compromising the substantial business customer base. Specifically, it is the PAN-OS GlobalProtect Clientless VPN system. A November 10th, 2021 Security Advisory released by Palo Alto Networks revealed that a high severity software vulnerability is affecting a Palo Alto Networks enterprise product.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |