Palo Alto 安全中心 04月10日 00:21
CVE-2025-0120 GlobalProtect App: Local Privilege Escalation (PE) Vulnerability (Severity: MEDIUM)
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

Palo Alto Networks发布安全通告,披露了GlobalProtect应用中的一个本地权限提升漏洞(CVE-2025-0120),该漏洞存在于Windows设备上。此漏洞允许本地已认证的非管理员用户提升权限至NT AUTHORITY\SYSTEM。虽然漏洞利用难度较高,因为需要成功利用一个竞争条件,但用户应尽快升级GlobalProtect应用以修复该问题。Palo Alto Networks尚未发现任何恶意利用该漏洞的迹象。

🛡️漏洞描述:Palo Alto Networks GlobalProtect应用在Windows设备上存在一个权限管理机制的漏洞,允许本地非管理员用户提升权限。

⚠️影响:成功利用该漏洞可能导致权限提升至NT AUTHORITY\SYSTEM,从而威胁系统安全。

🔨利用难度:由于需要成功利用一个竞争条件,该漏洞的利用较为困难。

💡解决方案:建议用户升级GlobalProtect应用至6.3.3或更高版本(对于6.3版本),或者升级至6.2.7-h3或6.2.8或更高版本(对于6.2版本)。

✅影响版本:受影响的版本包括GlobalProtect App 6.0、6.1、6.2和6.3版本,macOS、Linux、iOS、Android和UWP应用不受影响。

Palo Alto Networks Security Advisories

/

CVE-2025-0120

CVE-2025-0120 GlobalProtect App: Local Privilege Escalation (PE) Vulnerability

Exploit MaturityUNREPORTED

Response EffortMODERATE

RecoveryUSER

Value DensityCONCENTRATED

Attack VectorLOCAL

Attack ComplexityLOW

Attack RequirementsPRESENT

AutomatableNO

User InteractionNONE

Product ConfidentialityNONE

Product IntegrityHIGH

Product AvailabilityNONE

Privileges RequiredLOW

Subsequent ConfidentialityHIGH

Subsequent IntegrityHIGH

Subsequent AvailabilityHIGH

Description

A vulnerability with a privilege management mechanism in the Palo Alto Networks GlobalProtect™ app on Windows devices allows a locally authenticated non-administrative Windows user to escalate their privileges to NT AUTHORITY\SYSTEM. However, execution requires that the local user can also successfully exploit a race condition, which makes this vulnerability difficult to exploit.

Product Status

Required Configuration for Exposure

No special configuration is required to be affected by this issue.

Severity:MEDIUM, Suggested Urgency:MODERATE

A local Windows user (or malware) with non-administrative rights elevates their privileges to NT AUTHORITY/SYSTEM.
MEDIUM- CVSS-BT: 4.0 /CVSS-B: 7.1 (CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H/E:U/AU:N/R:U/V:C/RE:M/U:Amber)

Exploitation Status

Palo Alto Networks is not aware of any malicious exploitation of this issue.

Weakness Type and Impact

CWE-250 Execution with Unnecessary Privileges

CAPEC-233 Privilege Escalation

Solution

Version
Suggested Solution
GlobalProtect App 6.3 on WindowsUpgrade to 6.3.3 or later
GlobalProtect App 6.2 on Windows
Upgrade to 6.2.7-h3 or 6.2.8 or later
GlobalProtect App 6.1 on Windows
Upgrade to 6.2.8 or later or upgrade to 6.3.3 or later
GlobalProtect App 6.0 on Windows
Upgrade to 6.2.8 or later or upgrade to 6.3.3 or later
GlobalProtect App on macOSNo action needed
GlobalProtect App on LinuxNo action needed
GlobalProtect App on iOSNo action needed
GlobalProtect App on AndroidNo action needed
GlobalProtect UWP AppNo action needed

Workarounds and Mitigations

No workaround or mitigation is available.

Acknowledgments

Palo Alto Networks thanks Maxime ESCOURBIAC, Michelin CERT and Yassine BENGANA, Abicom for Michelin CERT for discovering and reporting the issue.

CPEs

cpe:2.3:a:paloaltonetworks:globalprotect_app:6.3.2:-:*:*:*:*:*:*

cpe:2.3:a:paloaltonetworks:globalprotect_app:6.3.1:-:*:*:*:*:*:*

cpe:2.3:a:paloaltonetworks:globalprotect_app:6.3.0:-:*:*:*:*:*:*

cpe:2.3:a:paloaltonetworks:globalprotect_app:6.2.7:-:*:*:*:*:*:*

cpe:2.3:a:paloaltonetworks:globalprotect_app:6.2.6:-:*:*:*:*:*:*

cpe:2.3:a:paloaltonetworks:globalprotect_app:6.2.4:-:*:*:*:*:*:*

cpe:2.3:a:paloaltonetworks:globalprotect_app:6.2.3:-:*:*:*:*:*:*

cpe:2.3:a:paloaltonetworks:globalprotect_app:6.2.2:-:*:*:*:*:*:*

cpe:2.3:a:paloaltonetworks:globalprotect_app:6.2.1:-:*:*:*:*:*:*

cpe:2.3:a:paloaltonetworks:globalprotect_app:6.2.0:-:*:*:*:*:*:*

cpe:2.3:a:paloaltonetworks:globalprotect_app:6.3.2:-:*:*:*:*:*:*

cpe:2.3:a:paloaltonetworks:globalprotect_app:6.3.1:-:*:*:*:*:*:*

cpe:2.3:a:paloaltonetworks:globalprotect_app:6.3.0:-:*:*:*:*:*:*

cpe:2.3:a:paloaltonetworks:globalprotect_app:6.2.7:-:*:*:*:*:*:*

cpe:2.3:a:paloaltonetworks:globalprotect_app:6.2.6:-:*:*:*:*:*:*

cpe:2.3:a:paloaltonetworks:globalprotect_app:6.2.4:-:*:*:*:*:*:*

cpe:2.3:a:paloaltonetworks:globalprotect_app:6.2.3:-:*:*:*:*:*:*

cpe:2.3:a:paloaltonetworks:globalprotect_app:6.2.2:-:*:*:*:*:*:*

cpe:2.3:a:paloaltonetworks:globalprotect_app:6.2.1:-:*:*:*:*:*:*

cpe:2.3:a:paloaltonetworks:globalprotect_app:6.2.0:-:*:*:*:*:*:*

Timeline

Initial Publication

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

Palo Alto Networks GlobalProtect 漏洞 安全通告 权限提升
相关文章