CVE-2023-0009 GlobalProtect App: Local Privilege Escalation (PE) Vulnerability
Attack Vector
LOCAL
Scope
UNCHANGED
Attack Complexity
LOW
Confidentiality Impact
HIGH
Privileges Required
LOW
Integrity Impact
HIGH
User Interaction
NONE
Availability Impact
HIGH
Description
A local privilege escalation (PE) vulnerability in the Palo Alto Networks GlobalProtect app on Windows enables a local user to execute programs with elevated privileges.
Product Status
Versions | Affected | Unaffected |
---|---|---|
GlobalProtect App 6.2 | None | All |
GlobalProtect App 6.1 | < 6.1.1 on Windows | >= 6.1.1 |
GlobalProtect App 6.0 | < 6.0.5 on Windows | >= 6.0.5 |
GlobalProtect App 5.2 | < 5.2.13 on Windows | >= 5.2.13 |
GlobalProtect App 5.1 | < 5.1.12 on Windows | >= 5.1.12 |
Severity: HIGH
CVSSv3.1 Base Score: 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
Exploitation Status
Palo Alto Networks is not aware of any malicious exploitation of this issue.
Weakness Type
CWE-807: Reliance on Untrusted Inputs in a Security Decision
Solution
This issue is fixed in GlobalProtect app 5.1.12, GlobalProtect app 5.2.13, GlobalProtect app 6.0.5, GlobalProtect app 6.1.1, and all later GlobalProtect app versions.
Acknowledgments
Palo Alto Networks thanks Mohammad Arman from Zurich Insurance for discovering and reporting this issue.
Timeline
Added 5.1.12 fix version
Validated an attack scenario that does not require the Windows user to have special privileges
Initial publication