A reliance on untrusted input for a security decision in the GlobalProtect app on Windows devices potentially enables a locally authenticated non-administrative Windows user to escalate their privileges to NT AUTHORITY\SYSTEM.
GlobalProtect App on macOS, Linux, iOS, Android, Chrome OS and GlobalProtect UWP App are not affected.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://security.paloaltonetworks.com/CVE-2025-0117 |
![]() ![]() |
History
Wed, 12 Mar 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 12 Mar 2025 19:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A reliance on untrusted input for a security decision in the GlobalProtect app on Windows devices potentially enables a locally authenticated non-administrative Windows user to escalate their privileges to NT AUTHORITY\SYSTEM. GlobalProtect App on Linux, iOS, Android, Chrome OS and GlobalProtect UWP App are not affected. | A reliance on untrusted input for a security decision in the GlobalProtect app on Windows devices potentially enables a locally authenticated non-administrative Windows user to escalate their privileges to NT AUTHORITY\SYSTEM. GlobalProtect App on macOS, Linux, iOS, Android, Chrome OS and GlobalProtect UWP App are not affected. |
Wed, 12 Mar 2025 18:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A reliance on untrusted input for a security decision in the GlobalProtect app on Windows devices potentially enables a locally authenticated non-administrative Windows user to escalate their privileges to NT AUTHORITY\SYSTEM. GlobalProtect App on Linux, iOS, Android, Chrome OS and GlobalProtect UWP App are not affected. | |
Title | GlobalProtect App: Local Privilege Escalation (PE) Vulnerability | |
First Time appeared |
Paloaltonetworks
Paloaltonetworks globalprotect App |
|
Weaknesses | CWE-807 | |
CPEs | cpe:2.3:a:paloaltonetworks:globalprotect_app:6.2.0:-:*:*:*:*:*:* cpe:2.3:a:paloaltonetworks:globalprotect_app:6.2.1:-:*:*:*:*:*:* cpe:2.3:a:paloaltonetworks:globalprotect_app:6.2.2:-:*:*:*:*:*:* cpe:2.3:a:paloaltonetworks:globalprotect_app:6.2.3:-:*:*:*:*:*:* cpe:2.3:a:paloaltonetworks:globalprotect_app:6.2.4:-:*:*:*:*:*:* cpe:2.3:a:paloaltonetworks:globalprotect_app:6.3.0:-:*:*:*:*:*:* cpe:2.3:a:paloaltonetworks:globalprotect_app:6.3.1:-:*:*:*:*:*:* cpe:2.3:a:paloaltonetworks:globalprotect_app:6.3.2:-:*:*:*:*:*:* |
|
Vendors & Products |
Paloaltonetworks
Paloaltonetworks globalprotect App |
|
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: palo_alto
Published:
Updated: 2025-03-13T03:55:23.839Z
Reserved: 2024-12-20T23:23:18.651Z
Link: CVE-2025-0117

Updated: 2025-03-12T19:07:55.600Z

Status : Received
Published: 2025-03-12T19:15:37.883
Modified: 2025-03-12T19:15:37.883
Link: CVE-2025-0117

No data.