Palo Alto 安全中心 前天 05:45
CVE-2025-2179 GlobalProtect App: Non Admin User Can Disable the GlobalProtect App (Severity: MEDIUM)
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

Palo Alto Networks GlobalProtect App on Linux存在一个非管理员用户可禁用应用的漏洞(CVE-2025-2179)。该漏洞源于不正确的权限分配,允许本地已认证的非管理员用户在特定配置下禁用GlobalProtect应用,即使配置本不允许。此问题影响运行6.2.0至6.2.8、6.1.0及更高版本、以及6.0.0及更高版本的Linux版GlobalProtect App。Windows、macOS、iOS、Android、Chrome OS及UWP版本不受影响。用户需将Linux GlobalProtect App升级至6.2.9或更高版本以修复此漏洞。目前Palo Alto Networks尚未发现此问题被恶意利用的迹象。

🛡️ **漏洞概述**: CVE-2025-2179指出,Palo Alto Networks的Linux版GlobalProtect App存在一个不正确的权限分配漏洞,允许本地已认证的非管理员用户禁用该应用程序,这与正常配置所允许的权限不符。

💻 **受影响版本与平台**: 此漏洞仅影响Linux设备上的GlobalProtect App,具体版本包括6.2.0至6.2.8,以及6.1.0及更高版本,还有6.0.0及更高版本。Windows、macOS、iOS、Android、Chrome OS和UWP版本不受此漏洞影响。

⚙️ **漏洞触发条件**: 用户易受此漏洞影响,前提是GlobalProtect配置为“每次用户登录设备时连接(始终开启)”且“允许用户禁用GlobalProtect”选项被设置为“不允许”或“允许但需密码”。

✅ **解决方案与修复**: 建议受影响的用户立即将Linux版GlobalProtect App升级至6.2.9或更高版本,以消除此安全隐患。目前没有提供其他可用的规避或缓解措施。

⚠️ **安全风险与状态**: 该漏洞被评定为中等(MEDIUM)严重性,建议采取中等(MODERATE)的紧急响应措施。Palo Alto Networks目前并未获知任何恶意利用此漏洞的报告。

Palo Alto Networks Security Advisories

/

CVE-2025-2179

CVE-2025-2179 GlobalProtect App: Non Admin User Can Disable the GlobalProtect App

Exploit MaturityUNREPORTED

Response EffortMODERATE

RecoveryUSER

Value DensityDIFFUSE

Attack VectorLOCAL

Attack ComplexityLOW

Attack RequirementsNONE

AutomatableNO

User InteractionNONE

Product ConfidentialityNONE

Product IntegrityNONE

Product AvailabilityHIGH

Privileges RequiredLOW

Subsequent ConfidentialityNONE

Subsequent IntegrityNONE

Subsequent AvailabilityNONE

Description

An incorrect privilege assignment vulnerability in the Palo Alto Networks GlobalProtect™ App on Linux devices enables a locally authenticated non administrative user to disable the app even if the GlobalProtect app configuration would not normally permit them to do so.

The GlobalProtect app on Windows, macOS, iOS, Android, Chrome OS and GlobalProtect UWP app are not affected.

Product Status

Required Configuration for Exposure

You are vulnerable to this issue if you have GlobalProtect configured with both of the following configurations:

    Connect method set to 'Every time the user logs on to the machine (Always On)''Allow User to Disable GlobalProtect' set to either Disallow or 'Allow with Passcode'

You can verify if these configurations are enabled by either

    Navigating to GlobalProtect > App Settings - GlobalProtect on the Strata Cloud Manager ORNavigating to Network > GlobalProtect > Portals > Agent on Panorama or PAN-OS management web interface for directly-managed devices.

Severity:MEDIUM, Suggested Urgency:MODERATE

CVSS-BT:4.3 /CVSS-B:6.8 (CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/AU:N/R:U/V:D/RE:M/U:Amber)

Exploitation Status

Palo Alto Networks is not aware of any malicious exploitation of this issue.

Weakness Type and Impact

CWE-266: Incorrect Privilege Assignment

CAPEC-578 Disable Security Software

Solution

Version
Minor Version
Suggested Solution
GlobalProtect App 6.2 on Linux
6.2.0 through 6.2.8 Upgrade to 6.2.9 or later.
GlobalProtect App 6.1 on LinuxUpgrade to 6.2.9 or later.
GlobalProtect App 6.0 on LinuxUpgrade to 6.2.9 or later.
GlobalProtect App on Android, ChromeOS, iOS, macOS, Windows
No action needed.

Workarounds and Mitigations

No workaround or mitigation is available.

Acknowledgments

Palo Alto Networks thanks Alex Bourla and Graham Brereton (graham.brereton@form3.tech) for discovering and reporting this issue.

CPEs

cpe:2.3:a:palo_alto_networks:globalprotect_app:6.2.8:*:*:*:*:Linux:*:*

cpe:2.3:a:palo_alto_networks:globalprotect_app:6.2.7:*:*:*:*:Linux:*:*

cpe:2.3:a:palo_alto_networks:globalprotect_app:6.2.6:*:*:*:*:Linux:*:*

cpe:2.3:a:palo_alto_networks:globalprotect_app:6.2.4:*:*:*:*:Linux:*:*

cpe:2.3:a:palo_alto_networks:globalprotect_app:6.2.3:*:*:*:*:Linux:*:*

cpe:2.3:a:palo_alto_networks:globalprotect_app:6.2.2:*:*:*:*:Linux:*:*

cpe:2.3:a:palo_alto_networks:globalprotect_app:6.2.1:*:*:*:*:Linux:*:*

cpe:2.3:a:palo_alto_networks:globalprotect_app:6.2.0:*:*:*:*:Linux:*:*

cpe:2.3:a:palo_alto_networks:globalprotect_app:6.1.7:*:*:*:*:Linux:*:*

cpe:2.3:a:palo_alto_networks:globalprotect_app:6.1.6:*:*:*:*:Linux:*:*

cpe:2.3:a:palo_alto_networks:globalprotect_app:6.1.5:*:*:*:*:Linux:*:*

cpe:2.3:a:palo_alto_networks:globalprotect_app:6.1.4:*:*:*:*:Linux:*:*

cpe:2.3:a:palo_alto_networks:globalprotect_app:6.1.3:*:*:*:*:Linux:*:*

cpe:2.3:a:palo_alto_networks:globalprotect_app:6.1.2:*:*:*:*:Linux:*:*

cpe:2.3:a:palo_alto_networks:globalprotect_app:6.1.1:*:*:*:*:Linux:*:*

cpe:2.3:a:palo_alto_networks:globalprotect_app:6.1.0:*:*:*:*:Linux:*:*

cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.11:*:*:*:*:Linux:*:*

cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.10:*:*:*:*:Linux:*:*

cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.8:*:*:*:*:Linux:*:*

cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.7:*:*:*:*:Linux:*:*

cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.6:*:*:*:*:Linux:*:*

cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.5:*:*:*:*:Linux:*:*

cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.4:*:*:*:*:Linux:*:*

cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.3:*:*:*:*:Linux:*:*

cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.2:*:*:*:*:Linux:*:*

cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.1:*:*:*:*:Linux:*:*

cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.0:*:*:*:*:Linux:*:*

CPE Applicability

  • cpe:2.3:a:palo_alto_networks:globalprotect_app:*:*:*:*:*:Linux:*:* is vulnerable from (including)6.2.0 and up to (excluding)6.2.9
  • ORcpe:2.3:a:palo_alto_networks:globalprotect_app:*:*:*:*:*:Linux:*:* is vulnerable from (including)6.1.0
  • ORcpe:2.3:a:palo_alto_networks:globalprotect_app:*:*:*:*:*:Linux:*:* is vulnerable from (including)6.0.0

Timeline

Initial Publication

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

GlobalProtect App Palo Alto Networks Linux安全 CVE-2025-2179 漏洞
相关文章