First published: Wed Oct 09 2024(Updated: )
A privilege escalation vulnerability in the Palo Alto Networks GlobalProtect app on Windows allows a locally authenticated non-administrative Windows user to escalate their privileges to NT AUTHORITY/SYSTEM through the use of the repair functionality offered by the .msi file used to install GlobalProtect.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Paloaltonetworks Globalprotect | >=5.1<6.2.5 | |
Paloaltonetworks Globalprotect | =6.3.0 | |
Paloaltonetworks Globalprotect | =6.3.1 |
This issue is fixed in GlobalProtect app 6.2.5, and will be fixed in the remaining supported versions of GlobalProtect app listed in the Product Status section. Updates will be published to this advisory as they become available. Customers who want to upgrade should reach out to customer support at https://support.paloaltonetworks.com .
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.