Palo Alto Networks Security Advisories /CVE-2023-0009CVE-2023-0009 GlobalProtect App: Local Privilege Escalation (PE) VulnerabilityAttack VectorLOCALScopeUNCHANGEDAttack ComplexityLOWConfidentiality ImpactHIGHPrivileges RequiredLOWIntegrity ImpactHIGHUser InteractionNONEAvailability ImpactHIGHNVDJSON Published2023-06-14 Updated2024-04-10ReferenceGPC-16078DiscoveredexternallyDescriptionA local privilege escalation (PE) vulnerability in the Palo Alto Networks GlobalProtect app on Windows enables a local user to execute programs with elevated privileges.Product StatusVersionsAffectedUnaffectedGlobalProtect App 6.2NoneAllGlobalProtect App 6.1< 6.1.1 on Windows>= 6.1.1GlobalProtect App 6.0< 6.0.5 on Windows>= 6.0.5GlobalProtect App 5.2< 5.2.13 on Windows>= 5.2.13GlobalProtect App 5.1< 5.1.12 on Windows>= 5.1.12Severity:HIGHCVSSv3.1Base Score:7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)Exploitation StatusPalo Alto Networks is not aware of any malicious exploitation of this issue.Weakness TypeCWE-807: Reliance on Untrusted Inputs in a Security DecisionSolutionThis issue is fixed in GlobalProtect app 5.1.12, GlobalProtect app 5.2.13, GlobalProtect app 6.0.5, GlobalProtect app 6.1.1, and all later GlobalProtect app versions.AcknowledgmentsPalo Alto Networks thanks Mohammad Arman from Zurich Insurance for discovering and reporting this issue.Timeline2024-04-10Added 5.1.12 fix version2023-07-31Validated an attack scenario that does not require the Windows user to have special privileges2023-06-14Initial publication