{"uuid": "d667e6df-1b57-4138-be74-d3bc77cc6fa6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-3064", "type": "published-proof-of-concept", "source": "https://t.me/secsocteam/192", "content": "\u062b\u063a\u0631\u0629 \u0645\u0646 \u0646\u0648\u0639 Zero-Day \u0641\u064a Palo Alto GlobalProtect VPN \u0628\u062a\u0633\u0645\u062d \u0644\u0644\u0640 Attacker \u0625\u0646\u0647 \u064a\u0640 Execute Arbitrary Code \u0639\u0644\u0649 \u0627\u0644\u0640 Virtual \u0648 \u0627\u0644\u0640 Physical Firewall \u0628\u0640 Root Privileges \u26a0\ufe0f\n\u0648 \u062a\u0645 \u062a\u0635\u0646\u064a\u0641 \u062e\u0637\u0648\u0631\u0629 \u0627\u0644\u062b\u063a\u0631\u0629 \u0627\u0644\u064a \u0631\u0642\u0645\u0647\u0627 CVE-2021-3064 \u0628\u062f\u0631\u062c\u0629 CVSS: 9.8 \u2622\ufe0f\n\u0648 \u0645\u0641\u064a\u0634 \u062a\u0641\u0627\u0635\u064a\u0644 \u062a\u064a\u0643\u0646\u064a\u0643\u0627\u0644 \u0647\u062a\u0646\u0632\u0644 \u0644\u0645\u062f\u0629 30 \u064a\u0648\u0645 \u0644\u0645\u0646\u0639 \u0627\u0644\u0640 Threat Actors \u0645\u0646 \u0625\u0633\u062a\u063a\u0644\u0627\u0644 \u0627\u0644\u062b\u063a\u0631\u0629 \ud83d\udc4c\ud83c\udffc\n\n\u0627\u0644\u0645\u0635\u0627\u062f\u0631 :\n1-Randori\nhttps://www.randori.com/blog/cve-2021-3064/\n\n2-The Hacker News :\nhttps://thehackernews.com/2021/11/palo-alto-warns-of-zero-day-bug-in.html\n\n#Security_Society", "creation_timestamp": "2021-11-11T08:10:59.000000Z"}