First published: Wed Aug 14 2024(Updated: )
A privilege escalation (PE) vulnerability in the Palo Alto Networks GlobalProtect app on Windows devices enables a local user to execute programs with elevated privileges.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Palo Alto Networks GlobalProtect Windows | >=5.1.0<=5.1.9 | |
Palo Alto Networks GlobalProtect Windows | >=6.0.0<=6.0.6 | |
Palo Alto Networks GlobalProtect Windows | >=6.1.0<6.1.5 | |
Palo Alto Networks GlobalProtect Windows | >=6.2.0<6.2.4 | |
Palo Alto Networks GlobalProtect Windows | =6.3.0 | |
All of | ||
Palo Alto Networks GlobalProtect UWP App | <5.1.x=5.1<6.0.10-c826=6.0<6.1.5=6.1<6.2.4=6.2<6.3.1=6.3 | 5.1.x (ETA: December 2024) 6.0.10-c826 6.1.5 6.2.4 6.3.1 |
Microsoft Windows | * |
This issue is fixed in GlobalProtect app 5.1.x (ETA: December 2024), GlobalProtect app 6.0.x (ETA: November 2024), GlobalProtect app 6.1.5, GlobalProtect app 6.2.4, GlobalProtect app 6.3.1 (ETA: end of August), and all later GlobalProtect app versions on Windows.
Ensure that the GlobalProtect installation directory and its contents cannot be modified by non-administrative Windows users.
This issue is fixed in GlobalProtect app 5.1.x (ETA: December 2024), GlobalProtect app 6.0.10-c826, GlobalProtect app 6.1.5, GlobalProtect app 6.2.4, GlobalProtect app 6.3.1, and all later GlobalProtect app versions on Windows.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-5915 is classified as a privilege escalation vulnerability, which can lead to elevated privileges for a local user.
To fix CVE-2024-5915, upgrade your Palo Alto Networks GlobalProtect app to the latest recommended versions.
CVE-2024-5915 affects users of specific versions of the Palo Alto Networks GlobalProtect app on Windows devices.
Versions 5.1.0 to 5.1.9, 6.0.0 to 6.0.6, 6.1.0 to 6.1.5, and 6.2.0 to 6.2.4 are affected by CVE-2024-5915.
No, CVE-2024-5915 specifically affects devices running vulnerable versions of the Palo Alto Networks GlobalProtect app.