An "image path execution hijacking" vulnerability affects the Palo Alto Networks Global Protect Client. Exploitation of this issue requires the root privileges on the local station. An attacker could exploit this vulnerability to obtain a certain level of persistence on the compromised host. (ref # GPC-4401 / CVE-2017-15870)
Successful exploitation requires local administrative privileges.
This issue affects GlobalProtect App for macOS 4.0.2 and earlier
|GlobalProtect App 4.0||<= 4.0.2 on OS X||>= 4.0.3 on OS X|
CVSSv3.1 Base Score: 6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)
GlobalProtect App for macOS 4.0.3 and later