CVE-2022-0016 GlobalProtect App: Privilege Escalation Vulnerability When Using Connect Before Logon With SAML Authentication
An improper handling of exceptional conditions vulnerability exists within the Connect Before Logon feature of the Palo Alto Networks GlobalProtect app when the feature is configured to use SAML authentication that enables a local attacker to escalate to SYSTEM or root privileges when authenticating with Connect Before Logon under certain circumstances.
This issue impacts GlobalProtect app 5.2 versions earlier than GlobalProtect app 5.2.9 on Windows and MacOS.
This issue does not affect the GlobalProtect app on other platforms.
|GlobalProtect App 5.3||None||5.3.*|
|GlobalProtect App 5.2||< 5.2.9 on Windows and MacOS||>= 5.2.9 on Windows and MacOS|
|GlobalProtect App 5.1||None||>= 5.1.*|
Required Configuration for Exposure
This issue is applicable only to devices configured to use SAML authentication in the GlobalProtect Connect Before Logon feature.
CVSSv3.1 Base Score:7.4 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)
Palo Alto Networks is not aware of any malicious exploitation of this issue.
This issue is fixed in GlobalProtect app 5.2.9 on Windows and MacOS, and all later GlobalProtect app versions.
Workarounds and Mitigations
Using non-SAML authentication methods in the GlobalProtect Connect Before Logon feature removes the impact of this issue.
More information on Connect Before Logon authentication modes is available here: