Palo Alto Networks Security Advisories / CVE-2023-0009

CVE-2023-0009 GlobalProtect App: Local Privilege Escalation (PE) Vulnerability

Severity 7.8 · HIGH
Attack Vector LOCAL
Attack Complexity LOW
Confidentiality Impact HIGH
Privileges Required LOW
Integrity Impact HIGH
User Interaction NONE
Availability Impact HIGH


A local privilege escalation (PE) vulnerability in the Palo Alto Networks GlobalProtect app on Windows enables a local user to execute programs with elevated privileges.

Product Status

GlobalProtect App 6.2NoneAll
GlobalProtect App 6.1< 6.1.1 on Windows>= 6.1.1
GlobalProtect App 6.0< 6.0.5 on Windows>= 6.0.5
GlobalProtect App 5.2< 5.2.13 on Windows>= 5.2.13
GlobalProtect App 5.1< 5.1.12 on Windows>= 5.1.12

Severity: HIGH

CVSSv3.1 Base Score: 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)

Exploitation Status

Palo Alto Networks is not aware of any malicious exploitation of this issue.

Weakness Type

CWE-807: Reliance on Untrusted Inputs in a Security Decision


This issue is fixed in GlobalProtect app 5.1.12, GlobalProtect app 5.2.13, GlobalProtect app 6.0.5, GlobalProtect app 6.1.1, and all later GlobalProtect app versions.


Palo Alto Networks thanks Mohammad Arman from Zurich Insurance for discovering and reporting this issue.


Added 5.1.12 fix version
Validated an attack scenario that does not require the Windows user to have special privileges
Initial publication
© 2024 Palo Alto Networks, Inc. All rights reserved.