Palo Alto 安全中心 03月13日
CVE-2025-0117 GlobalProtect App: Local Privilege Escalation (PE) Vulnerability (Severity: MEDIUM)
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

Palo Alto Networks发布安全通告,指出GlobalProtect App在Windows设备上存在本地权限提升漏洞(CVE-2025-0117)。该漏洞源于GlobalProtect App对不可信输入的依赖,允许本地非管理员权限的Windows用户将权限提升至NT AUTHORITY\SYSTEM级别。其他平台如macOS、Linux、iOS、Android和GlobalProtect UWP App不受影响。建议受影响的用户尽快升级至GlobalProtect App 6.3.3或6.2.6及更高版本,或通过MDM工具更新注册表键值以修复此漏洞。目前未发现该漏洞被恶意利用的案例。

⚠️ GlobalProtect App在Windows设备上存在CVE-2025-0117本地权限提升漏洞,影响版本包括6.0、6.1、6.2和6.3。

🛡️ 受影响的用户应升级至GlobalProtect App 6.3.3或6.2.6及更高版本,或通过修改注册表键值[HKEY_LOCAL_MACHINE\SOFTWARE\Palo Alto Networks\GlobalProtect\Settings]下的“check-communication”为“yes”并重启系统来修复漏洞。

🛠️ 对于新安装的GlobalProtect App,可以使用预部署密钥CHECKCOMM设置为“yes”的命令(msiexec.exe /i GlobalProtect64.msi CHECKCOMM="yes")来安装,以避免漏洞。

🙏 Palo Alto Networks感谢Maxime ESCOURBIAC、Michelin CERT、Yassine BENGANA、Abicom for Michelin CERT和Handelsbanken AB F-Secure发现并报告此问题。

Palo Alto Networks Security Advisories

/

CVE-2025-0117

CVE-2025-0117 GlobalProtect App: Local Privilege Escalation (PE) Vulnerability

Exploit MaturityUNREPORTED

Response EffortMODERATE

RecoveryUSER

Value DensityDIFFUSE

Attack VectorLOCAL

Attack ComplexityLOW

Attack RequirementsNONE

AutomatableNO

User InteractionPASSIVE

Product ConfidentialityNONE

Product IntegrityHIGH

Product AvailabilityNONE

Privileges RequiredLOW

Subsequent ConfidentialityHIGH

Subsequent IntegrityHIGH

Subsequent AvailabilityHIGH

Description

A reliance on untrusted input for a security decision in the GlobalProtect app on Windows devices potentially enables a locally authenticated non-administrative Windows user to escalate their privileges to NT AUTHORITY\SYSTEM.

GlobalProtect App on macOS, Linux, iOS, Android, Chrome OS and GlobalProtect UWP App are not affected.

Product Status

Required Configuration for Exposure

No special configuration is required to be vulnerable to this issue.

Severity:MEDIUM, Suggested Urgency:MODERATE

A local Windows user (or malware) with non-administrative rights elevates their privileges to NT AUTHORITY\SYSTEM.
CVSS-BT:4.3 /CVSS-B:7.1 (CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H/E:U/AU:N/R:U/V:D/RE:M/U:Amber)

Exploitation Status

Palo Alto Networks is not aware of any malicious exploitation of this issue.

Weakness Type and Impact

CWE-807 Reliance on Untrusted Inputs in a Security Decision

CAPEC-233 Privilege Escalation

Solution

Version
Suggested Solution
GlobalProtect App 6.3 on Windows
Upgrade to 6.3.3 or later
GlobalProtect App 6.2 on Windows
Upgrade to 6.2.6 or later
GlobalProtect App 6.1 on Windows
Upgrade to 6.2.6 or later or upgrade to 6.3.3 or later
GlobalProtect App 6.0 on Windows
Upgrade to 6.2.6 or later or upgrade to 6.3.3 or later
GlobalProtect App on LinuxNo action needed
GlobalProtect App on iOSNo action needed
GlobalProtect App on AndroidNo action needed
GlobalProtect UWP AppNo action needed

Solution for new and existing GlobalProtect app installation on Windows

You can use your endpoint mobile device management (MDM) tools to apply the following changes:

    Install a fixed version of the GlobalProtect app.
    Update the following registry key with the specified value (uses the REG_SZ type):
    [HKEY_LOCAL_MACHINE\SOFTWARE\Palo Alto Networks\GlobalProtect\Settings]
    "check-communication"="yes"Restart the operating system to apply this registry change.

Alternate solution for new GlobalProtect app installation on Windows

Install the GlobalProtect app with the pre-deployment key CHECKCOMM set to "yes":

msiexec.exe /i GlobalProtect64.msi CHECKCOMM="yes"

Note: This command adds the registry value from the previous solution instructions—no additional MSI options are needed.

Workarounds and Mitigations

No workaround or mitigation is available.

Acknowledgments

Palo Alto Networks thanks Maxime ESCOURBIAC, Michelin CERT, Yassine BENGANA, Abicom for Michelin CERT, and Handelsbanken AB F-Secure for discovering and reporting the issue.

CPEs

cpe:2.3:a:paloaltonetworks:globalprotect_app:6.3.2:-:*:*:*:*:*:*

cpe:2.3:a:paloaltonetworks:globalprotect_app:6.3.1:-:*:*:*:*:*:*

cpe:2.3:a:paloaltonetworks:globalprotect_app:6.3.0:-:*:*:*:*:*:*

cpe:2.3:a:paloaltonetworks:globalprotect_app:6.2.4:-:*:*:*:*:*:*

cpe:2.3:a:paloaltonetworks:globalprotect_app:6.2.3:-:*:*:*:*:*:*

cpe:2.3:a:paloaltonetworks:globalprotect_app:6.2.2:-:*:*:*:*:*:*

cpe:2.3:a:paloaltonetworks:globalprotect_app:6.2.1:-:*:*:*:*:*:*

cpe:2.3:a:paloaltonetworks:globalprotect_app:6.2.0:-:*:*:*:*:*:*

cpe:2.3:a:paloaltonetworks:globalprotect_app:6.3.2:-:*:*:*:*:*:*

cpe:2.3:a:paloaltonetworks:globalprotect_app:6.3.1:-:*:*:*:*:*:*

cpe:2.3:a:paloaltonetworks:globalprotect_app:6.3.0:-:*:*:*:*:*:*

cpe:2.3:a:paloaltonetworks:globalprotect_app:6.2.4:-:*:*:*:*:*:*

cpe:2.3:a:paloaltonetworks:globalprotect_app:6.2.3:-:*:*:*:*:*:*

cpe:2.3:a:paloaltonetworks:globalprotect_app:6.2.2:-:*:*:*:*:*:*

cpe:2.3:a:paloaltonetworks:globalprotect_app:6.2.1:-:*:*:*:*:*:*

cpe:2.3:a:paloaltonetworks:globalprotect_app:6.2.0:-:*:*:*:*:*:*

Timeline

Initial Publication

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

GlobalProtect App 权限提升 安全漏洞 CVE-2025-0117
相关文章