Headline
CVE-2023-0009: CVE-2023-0009 GlobalProtect App: Local Privilege Escalation (PE) Vulnerability
A local privilege escalation (PE) vulnerability in the Palo Alto Networks GlobalProtect app on Windows enables a local service account or user with token impersonation privileges to execute programs with elevated privileges.
Palo Alto Networks Security Advisories / CVE-2023-0009
Attack Vector LOCAL
Scope UNCHANGED
Attack Complexity LOW
Confidentiality Impact HIGH
Privileges Required HIGH
Integrity Impact HIGH
User Interaction NONE
Availability Impact HIGH
NVD JSON
Published 2023-06-14
Updated 2023-06-14
Reference GPC-16078
Discovered externally
Description
A local privilege escalation (PE) vulnerability in the Palo Alto Networks GlobalProtect app on Windows enables a local service account or user with token impersonation privileges to execute programs with elevated privileges.
Product Status
Versions
Affected
Unaffected
GlobalProtect App 6.1
< 6.1.1 on Windows
>= 6.1.1
GlobalProtect App 6.0
< 6.0.5 on Windows
>= 6.0.5
GlobalProtect App 5.2
< 5.2.13 on Windows
>= 5.2.13
Severity:MEDIUM
CVSSv3.1 Base Score:6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)
Exploitation Status
Palo Alto Networks is not aware of any malicious exploitation of this issue.
Weakness Type
CWE-807: Reliance on Untrusted Inputs in a Security Decision
Solution
This issue is fixed in GlobalProtect app 5.2.13, GlobalProtect app 6.0.5, GlobalProtect app 6.1.1, and all later GlobalProtect app versions.
Acknowledgments
Palo Alto Networks thanks Mohammad Arman from Zurich Insurance for discovering and reporting this issue.
Timeline
2023-06-14 Initial publication