Security
Headlines
HeadlinesLatestCVEs

Headline

Palo Alto Networks GlobalProtect Local Privilege Escalation

Palo Alto Networks GlobalProtect versions 5.1.x, 5.2.x, 6.0.x, 6.1.x, 6.3.x and versions less than 6.2.5 suffer from a local privilege escalation vulnerability.

Packet Storm
#vulnerability#web#windows#google#microsoft#git#chrome#firefox

SEC Consult Vulnerability Lab Security Advisory < 20241009-0 >

          title: Local Privilege Escalation via MSI installer  
        product: Palo Alto Networks GlobalProtect  

vulnerable version: 5.1.x, 5.2.x, 6.0.x, 6.1.x, <6.2.5, 6.3.x
fixed version: >=6.2.5, all other versions are not patched yet
CVE number: CVE-2024-9473
impact: high
homepage: https://docs.paloaltonetworks.com/globalprotect
found: 2023-11-16
by: Michael Baer (Office Fürth)
SEC Consult Vulnerability Lab

                 An integrated part of SEC Consult, an Eviden business  
                 Europe | Asia

                 https://www.sec-consult.com

=======================================================================

Vendor description:

“GlobalProtect enables you to use Palo Alto Networks next-gen firewalls or
Prisma Access to secure your mobile workforce.”

Source: https://docs.paloaltonetworks.com/globalprotect

Business recommendation:

The vendor provides a patched version v6.2.5 which should be installed immediately.
Further affected branches will be patched by the vendor in the future, except
branch 5.2.x which is EOL. Users are urged to upgrade to the most recent versions.

SEC Consult highly recommends to perform a thorough security review of the
product conducted by security professionals to identify and resolve potential
further security issues.

Vulnerability overview/description:

  1. Local Privilege Escalation via MSI installer (CVE-2024-9473)
    The configuration of the GlobalProtect MSI installer file was found to
    produce a visible conhost.exe window running as the SYSTEM user when using
    the repair function of msiexec.exe. This allows a local, low-privileged
    attacker to use a chain of actions, to open a fully functional cmd.exe
    with the privileges of the SYSTEM user.

Proof of concept:

  1. Local Privilege Escalation via MSI installer (CVE-2024-9473)
    For the exploit to work, GlobalProtect has to be installed via the MSI file.
    Afterwards, any low-privileged user can start the repair of GlobalProtect by
    double-clicking the installer and trigger the vulnerable actions
    without a UAC popup. The installer, if deleted from it’s original location,
    can be found in C:\Windows\Installer with a randomized name.

During the repair process, the subprocess PanVCrediChecker.exe gets
called with SYSTEM privileges and performs a read action on the file
"C:\Program Files\Palo Alto Networks\GlobalProtect\libeay32.dll".

This can be used by an attacker by simply setting an oplock on the file.
As soon as it gets read, the process is blocked until the lock is released.
To do that, one can use the ‘SetOpLock.exe’ tool from
“https://github.com/googleprojectzero/symboliclink-testing-tools”
with the following parameters:

SetOpLock.exe “C:\Program Files\Palo Alto Networks\GlobalProtect\libeay32.dll” x
See figure 1 [lock.webp]

During the repair process, the locked file is accessed several times. The lock
has to be released by pressing ENTER five times before the conhost.exe
window opens. For the sixth request, the lock should not be released to keep the
window open. The conhost window that gets opened when PanVcrediChecker.exe is
executed doesn’t close and can then be interacted with.

The attacker can then perform the following actions to
spawn a SYSTEM shell:

  • Right click on the top bar of the window
  • Click on properties [ see figure 2 openbrowser.webp]
  • Under options, click on the “new console features” link [see figure 2
    openbrowser.webp]
  • Open the link with e.g. firefox or chrome [see figure 2 openbrowser.webp]
  • In the opened browser window press the key combination CTRL+o
  • Type cmd.exe in the top bar and press Enter [see figure 3 cmd.webp]

Note that this does not work using a recent version of the Edge Browser.

Vulnerable / tested versions:

The following versions have been tested which were the only versions
available to SEC Consult at the time of the test. SEC Consult was not
entirely sure, which exact version the product was:

  • ProductVersion as stated by the PropertyTable: 5.2.10
  • Version as stated by Windows after installing: 5.1.5
  • 6.1.2 is affected as well

The vendor confirmed that versions <6.2.5 are affected. Furthermore,
all other branches 5.1.x, 5.2.x, 6.0.x, 6.1.x and 6.3.x are affected
as well. Branch 5.2.x is end of life according to the vendor and will
not be patched.

Vendor contact timeline:

2023-11-17: Contacting vendor through [email protected]
asking for most recent software version
2023-11-21: Vendor confirms receipt of contact
2023-11-23: Vendor denies providing most recent version and asks for
full technical report via their online form:
https://security.paloaltonetworks.com/report
Note: Submitting the advisory draft via online form
repeatedly results in server errors
2023-11-23: Sending the advisory via [email protected]
2024-01-11: Contacting vendor through [email protected]
asking for confirmation of receiving the advisory and
status of their triage.
2024-01-12: Vendor confirms receiving the advisory.
The issue is tracked internally.
2024-03-06: Contacting vendor through [email protected]
asking for update of the vulnerability.
2024-04-02: The vendor notifies that the product team is working
on the report.
2024-04-08: Asking vendor to notify about updates and the timeline
of a fix.
2024-04-24: Vendor was able to reproduce the issue, but not in the
most recent versions. 5.1.5 is affected, but not 5.2.10
nor 5.1.12, nor 6.2.2.
2024-05-23: Asking vendor about affected/fixed versions and regarding
CVE number.
2024-05-30: Vendor apologizes for version confusion, following up with team
internally. Vendor plans to publish an advisory with CVE, but
no date yet, asks us to wait/coordinate our advisory with theirs.
2024-06-03: Answering that we will wait for their release & advisory.
2024-06-17: Asking for a status update regarding the version numbers &
advisory release.
Vendor: no ETA/timeline yet, no version information.
2024-09-25: Asking for a status update regarding the vendor advisory and for
confirmation of the available fixes.
2024-09-27: Vendor investigated further and previous versions are unfortunately
affected as well. Product team works on a fix, advisory & CVE
release scheduled for 9th October 9 AM PT.
2024-09-27: Acknowledging the coordinated advisory release for 9th October.
2024-10-03: Vendor communicates further information regarding affected versions
and their advisory draft.
2024-10-07: Vendor confirms 5.2.x as affected as well, but is EOL without fix.
2024-10-09: Coordinated release of security advisory.

Solution:

The vendor provides an updated version v6.2.5 which fixes the issues for this
specific branch. Other versions are not yet patched and will be fixed in future
releases.

Further information can be found at the vendor’s website.
https://security.paloaltonetworks.com

Users are urged to upgrade to the latest version and remove old versions
of the MSI installer, especially users of v5.2.x as this branch is EOL and won’t
receive an update.

SEC Consult has also released a blog post on 12th September 2024 regarding MSI
installer security issues tracked as CVE-2024-38014 and a general fix by
Microsoft. We have contacted Microsoft to have a more general solution for
every affected vendor. For further details check out the blog post:
https://r.sec-consult.com/msi

Workaround:

None

Advisory URL:

https://sec-consult.com/vulnerability-lab/


SEC Consult Vulnerability Lab   
An integrated part of SEC Consult, an Eviden business  
Europe | Asia

About SEC Consult Vulnerability Lab  
The SEC Consult Vulnerability Lab is an integrated part of SEC Consult, an  
Eviden business. It ensures the continued knowledge gain of SEC Consult in the  
field of network and application security to stay ahead of the attacker. The  
SEC Consult Vulnerability Lab supports high-quality penetration testing and  
the evaluation of new offensive and defensive technologies for our customers.  
Hence our customers obtain the most current information about vulnerabilities  
and valid recommendation about the risk profile of new technologies.

Interested to work with the experts of SEC Consult?
Send us your application https://sec-consult.com/career/

Interested in improving your cyber security with the experts of SEC Consult?
Contact our local offices https://sec-consult.com/contact/


Mail: security-research at sec-consult dot com  
Web: https://www.sec-consult.com  
Blog: https://blog.sec-consult.com  
Twitter: https://twitter.com/sec_consult

EOF Michael Baer, Johannes Greil / 2024

Related news

Nitro PDF Pro Local Privilege Escalation

The Nitro PDF Pro application uses a .msi installer file (embedded into an executable .exe installer file) for installation. The MSI installer uses custom actions in repair mode in an unsafe way. Attackers with low-privileged system access to a Windows system where Nitro PDF Pro is installed, can exploit the cached MSI installer's custom actions to effectively escalate privileges and get a command prompt running in context of NT AUTHORITY\SYSTEM. Versions prior to 14.26.1.0 and 13.70.8.82 and affected.

Microsoft Issues Patches for 79 Flaws, Including 3 Actively Exploited Windows Flaws

Microsoft on Tuesday disclosed that three new security flaws impacting the Windows platform have come under active exploitation as part of its Patch Tuesday update for September 2024. The monthly security release addresses a total of 79 vulnerabilities, of which seven are rated Critical, 71 are rated Important, and one is rated Moderate in severity. This is aside from 26 flaws that the tech

Bug Left Some Windows PCs Dangerously Unpatched

Microsoft Corp. today released updates to fix at least 79 security vulnerabilities in its Windows operating systems and related software, including multiple flaws that are already showing up in active attacks. Microsoft also corrected a critical bug that has caused some Windows 10 PCs to remain dangerously unpatched against actively exploited vulnerabilities for several months this year.

Microsoft Discloses 4 Zero-Days in September Update

This month's Patch Tuesday contains a total of 79 vulnerabilities — the fourth largest of the year.

Four zero-days included in group of 79 vulnerabilities Microsoft discloses, including one with 9.8 severity score

September’s monthly round of patches from Microsoft included 79 vulnerabilities, seven of which are considered critical.

Packet Storm: Latest News

ABB Cylon Aspect 3.08.01 persistenceManagerAjax.php Directory Traversal