First published: Wed Aug 14 2024(Updated: )
A privilege escalation (PE) vulnerability in the Palo Alto Networks GlobalProtect app on Windows devices enables a local user to execute programs with elevated privileges.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Palo Alto Networks GlobalProtect Windows | >=5.1.0<=5.1.9 | |
Palo Alto Networks GlobalProtect Windows | >=6.0.0<=6.0.6 | |
Palo Alto Networks GlobalProtect Windows | >=6.1.0<6.1.5 | |
Palo Alto Networks GlobalProtect Windows | >=6.2.0<6.2.4 | |
Palo Alto Networks GlobalProtect Windows | =6.3.0 | |
All of | ||
Palo Alto Networks GlobalProtect | <5.1.x=5.1<6.0.10-c826=6.0<6.1.5=6.1<6.2.4=6.2<6.3.1=6.3 | 5.1.x (ETA: December 2024) 6.0.10-c826 6.1.5 6.2.4 6.3.1 |
Microsoft Windows | * |
This issue is fixed in GlobalProtect app 5.1.x (ETA: December 2024), GlobalProtect app 6.0.x (ETA: November 2024), GlobalProtect app 6.1.5, GlobalProtect app 6.2.4, GlobalProtect app 6.3.1 (ETA: end of August), and all later GlobalProtect app versions on Windows.
Ensure that the GlobalProtect installation directory and its contents cannot be modified by non-administrative Windows users.
This issue is fixed in GlobalProtect app 5.1.x (ETA: December 2024), GlobalProtect app 6.0.10-c826, GlobalProtect app 6.1.5, GlobalProtect app 6.2.4, GlobalProtect app 6.3.1, and all later GlobalProtect app versions on Windows.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.