First published: Thu Feb 10 2022(Updated: )
An improper link resolution before file access ('link following') vulnerability exists in the Palo Alto Networks GlobalProtect app on Windows that enables a local attacker to disrupt system processes and potentially execute arbitrary code with SYSTEM privileges under certain circumstances. This issue impacts: GlobalProtect app 5.1 versions earlier than GlobalProtect app 5.1.10 on Windows. GlobalProtect app 5.2 versions earlier than GlobalProtect app 5.2.5 on Windows. This issue does not affect GlobalProtect app on other platforms.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Paloaltonetworks Globalprotect | >=5.1<5.1.10 | |
Paloaltonetworks Globalprotect | >=5.2<5.2.5 | |
Microsoft Windows |
This issue is fixed in GlobalProtect app 5.1.10 on Windows, GlobalProtect app 5.2.5 on Windows and all later GlobalProtect app versions.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-0017 is an improper link resolution before file access vulnerability in the Palo Alto Networks GlobalProtect app on Windows.
CVE-2022-0017 has a severity score of 7.8 (high).
Palo Alto Networks GlobalProtect versions 5.1 through 5.1.10 and versions 5.2 through 5.2.5 on Windows are affected by CVE-2022-0017.
An attacker can exploit CVE-2022-0017 by following an improper link and executing arbitrary code with SYSTEM privileges.
No, Microsoft Windows is not vulnerable to CVE-2022-0017.