Palo Alto 安全中心 05月15日 00:26
CVE-2025-0135 GlobalProtect App on macOS: Non Admin User Can Disable the GlobalProtect App (Severity: LOW)
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

Palo Alto Networks 发布安全公告,披露了 macOS 设备上 GlobalProtect 应用程序的一个漏洞(CVE-2025-0135)。该漏洞允许本地身份验证的非管理员用户禁用该应用程序。受影响的版本包括 GlobalProtect App 6.0、6.1、6.2 和 6.3。Palo Alto Networks 建议用户升级到 6.2.8 或 6.3.3 或更高版本以修复此问题。该漏洞的 CVSS 评分为 5.2,攻击复杂度较低,无需特殊配置即可利用。

🛡️漏洞描述:Palo Alto Networks GlobalProtect App 在 macOS 设备上存在一个权限分配不当的漏洞,允许非管理员用户禁用该应用程序。

💻受影响范围:受影响的 GlobalProtect App 版本包括 macOS 上的 6.0、6.1、6.2 和 6.3 版本。其他操作系统(如 Windows、Linux、iOS、Android 和 Chrome OS)以及 GlobalProtect UWP 应用程序不受影响。

⚠️风险评估:该漏洞的 CVSS 评分为 5.2,属于中等严重程度。攻击复杂度较低,无需用户交互即可利用。目前,Palo Alto Networks 尚未发现该漏洞被恶意利用。

💡解决方案:Palo Alto Networks 建议用户升级到 GlobalProtect App 6.2.8 或 6.3.3 或更高版本以修复此漏洞。没有可用的临时解决方法或缓解措施。

👏致谢:Palo Alto Networks 感谢 Alex Bourla 和 Graham Brereton 发现了并报告了此问题。

Palo Alto Networks Security Advisories

/

CVE-2025-0135

CVE-2025-0135 GlobalProtect App on macOS: Non Admin User Can Disable the GlobalProtect App

Exploit MaturityUNREPORTED

Response EffortMODERATE

RecoveryUSER

Value DensityDIFFUSE

Attack VectorLOCAL

Attack ComplexityLOW

Attack RequirementsNONE

AutomatableNO

User InteractionPASSIVE

Product ConfidentialityNONE

Product IntegrityLOW

Product AvailabilityHIGH

Privileges RequiredLOW

Subsequent ConfidentialityNONE

Subsequent IntegrityNONE

Subsequent AvailabilityNONE

Description

An incorrect privilege assignment vulnerability in the Palo Alto Networks GlobalProtect™ App on macOS devices enables a locally authenticated non administrative user to disable the app.

The GlobalProtect app on Windows, Linux, iOS, Android, Chrome OS and GlobalProtect UWP app are not affected.

Product Status

Required Configuration for Exposure

No special configuration is required to be vulnerable to this issue.

Severity:LOW, Suggested Urgency:MODERATE

CVSS-BT:1.8 /CVSS-B:5.2 (CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N/E:U/AU:N/R:U/V:D/RE:M/U:Amber)

Exploitation Status

Palo Alto Networks is not aware of any malicious exploitation of this issue.

Weakness Type and Impact

CWE-266: Incorrect Privilege Assignment

CAPEC-578 Disable Security Software

Solution

Version
Suggested Solution
GlobalProtect App 6.3 on macOS
Upgrade to 6.3.3 or later
GlobalProtect App 6.2 on macOS
Upgrade to 6.2.8 or later
GlobalProtect App 6.1 on macOS
Upgrade to 6.2.8 or later or 6.3.3 or later
GlobalProtect App 6.0 on macOS
Upgrade to 6.2.8 or later or 6.3.3 or later
GlobalProtect App on LinuxNot Applicable
GlobalProtect App on WindowsNot Applicable
GlobalProtect App on iOSNot Applicable
GlobalProtect App on AndroidNot Applicable
GlobalProtect UWP AppNot Applicable


Workarounds and Mitigations

No workaround or mitigation is available.

Acknowledgments

Palo Alto Networks thanks Alex Bourla (alex.bourla@form3.tech) and Graham Brereton (graham.brereton@form3.tech) for discovering and reporting the issue.

CPEs

cpe:2.3:a:paloaltonetworks:globalprotect_app:6.3.2:-:*:*:*:*:*:*

cpe:2.3:a:paloaltonetworks:globalprotect_app:6.3.1:-:*:*:*:*:*:*

cpe:2.3:a:paloaltonetworks:globalprotect_app:6.3.0:-:*:*:*:*:*:*

cpe:2.3:a:paloaltonetworks:globalprotect_app:6.2.4:-:*:*:*:*:*:*

cpe:2.3:a:paloaltonetworks:globalprotect_app:6.2.3:-:*:*:*:*:*:*

cpe:2.3:a:paloaltonetworks:globalprotect_app:6.2.2:-:*:*:*:*:*:*

cpe:2.3:a:paloaltonetworks:globalprotect_app:6.2.1:-:*:*:*:*:*:*

cpe:2.3:a:paloaltonetworks:globalprotect_app:6.2.0:-:*:*:*:*:*:*

cpe:2.3:a:paloaltonetworks:globalprotect_app:6.3.2:-:*:*:*:*:*:*

cpe:2.3:a:paloaltonetworks:globalprotect_app:6.3.1:-:*:*:*:*:*:*

cpe:2.3:a:paloaltonetworks:globalprotect_app:6.3.0:-:*:*:*:*:*:*

cpe:2.3:a:paloaltonetworks:globalprotect_app:6.2.4:-:*:*:*:*:*:*

cpe:2.3:a:paloaltonetworks:globalprotect_app:6.2.3:-:*:*:*:*:*:*

cpe:2.3:a:paloaltonetworks:globalprotect_app:6.2.2:-:*:*:*:*:*:*

cpe:2.3:a:paloaltonetworks:globalprotect_app:6.2.1:-:*:*:*:*:*:*

cpe:2.3:a:paloaltonetworks:globalprotect_app:6.2.0:-:*:*:*:*:*:*

Timeline

Initial Publication

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

Palo Alto Networks GlobalProtect macOS 漏洞 安全
相关文章