A reliance on untrusted input for a security decision in the GlobalProtect app on Windows devices potentially enables a locally authenticated non-administrative Windows user to escalate their privileges to NT AUTHORITY\SYSTEM.
GlobalProtect App on macOS, Linux, iOS, Android, Chrome OS and GlobalProtect UWP App are not affected.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://security.paloaltonetworks.com/CVE-2025-0117 |
|
History
Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Wed, 12 Mar 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 12 Mar 2025 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A reliance on untrusted input for a security decision in the GlobalProtect app on Windows devices potentially enables a locally authenticated non-administrative Windows user to escalate their privileges to NT AUTHORITY\SYSTEM. GlobalProtect App on Linux, iOS, Android, Chrome OS and GlobalProtect UWP App are not affected. | A reliance on untrusted input for a security decision in the GlobalProtect app on Windows devices potentially enables a locally authenticated non-administrative Windows user to escalate their privileges to NT AUTHORITY\SYSTEM. GlobalProtect App on macOS, Linux, iOS, Android, Chrome OS and GlobalProtect UWP App are not affected. |
Wed, 12 Mar 2025 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A reliance on untrusted input for a security decision in the GlobalProtect app on Windows devices potentially enables a locally authenticated non-administrative Windows user to escalate their privileges to NT AUTHORITY\SYSTEM. GlobalProtect App on Linux, iOS, Android, Chrome OS and GlobalProtect UWP App are not affected. | |
| Title | GlobalProtect App: Local Privilege Escalation (PE) Vulnerability | |
| First Time appeared |
Paloaltonetworks
Paloaltonetworks globalprotect App |
|
| Weaknesses | CWE-807 | |
| CPEs | cpe:2.3:a:paloaltonetworks:globalprotect_app:6.2.0:-:*:*:*:*:*:* cpe:2.3:a:paloaltonetworks:globalprotect_app:6.2.1:-:*:*:*:*:*:* cpe:2.3:a:paloaltonetworks:globalprotect_app:6.2.2:-:*:*:*:*:*:* cpe:2.3:a:paloaltonetworks:globalprotect_app:6.2.3:-:*:*:*:*:*:* cpe:2.3:a:paloaltonetworks:globalprotect_app:6.2.4:-:*:*:*:*:*:* cpe:2.3:a:paloaltonetworks:globalprotect_app:6.3.0:-:*:*:*:*:*:* cpe:2.3:a:paloaltonetworks:globalprotect_app:6.3.1:-:*:*:*:*:*:* cpe:2.3:a:paloaltonetworks:globalprotect_app:6.3.2:-:*:*:*:*:*:* |
|
| Vendors & Products |
Paloaltonetworks
Paloaltonetworks globalprotect App |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: palo_alto
Published: 2025-03-12T18:35:35.409Z
Updated: 2025-03-13T03:55:23.839Z
Reserved: 2024-12-20T23:23:18.651Z
Link: CVE-2025-0117
Updated: 2025-03-12T19:07:55.600Z
Status : Received
Published: 2025-03-12T19:15:37.883
Modified: 2025-03-12T19:15:37.883
Link: CVE-2025-0117
No data.