Palo Alto Networks Security Advisories /CVE-2024-5915CVE-2024-5915 GlobalProtect App: Local Privilege Escalation (PE) VulnerabilityUrgencyMODERATEResponse EffortMODERATERecoveryAUTOMATICValue DensityDIFFUSEAttack VectorLOCALAttack ComplexityLOWAttack RequirementsPRESENTAutomatableNOUser InteractionNONEProduct ConfidentialityNONEProduct IntegrityLOWProduct AvailabilityNONEPrivileges RequiredLOWSubsequent ConfidentialityHIGHSubsequent IntegrityHIGHSubsequent AvailabilityHIGHNVDJSON Published2024-08-14 Updated2024-08-14ReferenceGPC-14958 andGPC-19883DiscoveredexternallyDescriptionA privilege escalation (PE) vulnerability in the Palo Alto Networks GlobalProtect app on Windows devices enables a local user to execute programs with elevated privileges.Product StatusVersionsAffectedUnaffectedGlobalProtect App 6.3< 6.3.1 on Windows>= 6.3.1 (ETA: end of August) on WindowsGlobalProtect App 6.2< 6.2.4 on Windows>= 6.2.4 on WindowsGlobalProtect App 6.1< 6.1.5 on Windows>= 6.1.5 on WindowsGlobalProtect App 6.0< 6.0.x on Windows>= 6.0.x (ETA: November 2024) on WindowsGlobalProtect App 5.1< 5.1.x on Windows>= 5.1.x (ETA: December 2024) on WindowsSeverity:MEDIUMCVSSv4.0Base Score:5.2 (CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:H/SI:H/SA:H/AU:N/R:A/V:D/RE:M/U:Amber)Exploitation StatusPalo Alto Networks is not aware of any malicious exploitation of this issue.Weakness TypeCWE-732 Incorrect Permission Assignment for Critical ResourceSolutionThis issue is fixed in GlobalProtect app 5.1.x (ETA: December 2024), GlobalProtect app 6.0.x (ETA: November 2024), GlobalProtect app 6.1.5, GlobalProtect app 6.2.4, GlobalProtect app 6.3.1 (ETA: end of August), and all later GlobalProtect app versions on Windows.AcknowledgmentsPalo Alto Networks thanks Ashutosh Gautam/JumpThere, Maciej Miszczyk of Logitech, Will Dormann of ANALYGENCE, Farid Zerrouk, Alaa Kachouh, and Ali Jammal for discovering and reporting this issue.Timeline2024-08-14Initial publication