A critical vulnerability has been found on Cisco, F5 Networks, Palo Alto Networks and Pulse Secure VPN applications.
A vulnerability, CVE-2019-1573 was found. This vulnerability is caused by the VPN application storing the authentication and/or session cookies insecurely in memory and/or log files.
A successful exploit could allow the attacker to replay the session and bypass other authentication methods. The attacker would then have access to the same applications that the user does through their VPN session.
Palo Alto has released a patch, Pulse Secure released a security advisory, Cisco and F5 Networks have released a public statement regarding the vulnerability. If you use the Palo Alto VPN we suggest patching, if you use Cisco, F5 or Pulse Secure we suggest keeping a watch for patches that should be released soon.