CVE-2023-0009 GlobalProtect App: Local Privilege Escalation (PE) Vulnerability
Attack Vector LOCAL
Scope UNCHANGED
Attack Complexity LOW
Confidentiality Impact HIGH
Privileges Required LOW
Integrity Impact HIGH
User Interaction NONE
Availability Impact HIGH
Description
A local privilege escalation (PE) vulnerability in the Palo Alto Networks GlobalProtect app on Windows enables a local user to execute programs with elevated privileges.
Product Status
Versions | Affected | Unaffected |
---|---|---|
GlobalProtect App 6.2 | None | All |
GlobalProtect App 6.1 | < 6.1.1 on Windows | >= 6.1.1 |
GlobalProtect App 6.0 | < 6.0.5 on Windows | >= 6.0.5 |
GlobalProtect App 5.2 | < 5.2.13 on Windows | >= 5.2.13 |
Severity: HIGH
CVSSv3.1 Base Score: 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
Exploitation Status
Palo Alto Networks is not aware of any malicious exploitation of this issue.
Weakness Type
CWE-807: Reliance on Untrusted Inputs in a Security Decision
Solution
This issue is fixed in GlobalProtect app 5.2.13, GlobalProtect app 6.0.5, GlobalProtect app 6.1.1, and all later GlobalProtect app versions.
Acknowledgments
Palo Alto Networks thanks Mohammad Arman from Zurich Insurance for discovering and reporting this issue.
Timeline
Validated an attack scenario that does not require the Windows user to have special privileges
Initial publication