Incorrect Permission Assignment for Critical Resource (CWE-732)
A privilege escalation (PE) vulnerability in the Palo Alto Networks GlobalProtect app on Windows devices enables a local user to execute programs with elevated privileges.
This vulnerability allows a local user with low privileges to execute programs with elevated privileges on Windows devices running the affected versions of Palo Alto Networks GlobalProtect app. This could lead to unauthorized access to sensitive system resources, data manipulation, and potential compromise of the entire system. The vulnerability has a high impact on confidentiality, integrity, and availability of the affected system.
There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.
A patch is available. Palo Alto Networks has released security updates to address this vulnerability.
1. Update the Palo Alto Networks GlobalProtect app to the latest patched version. 2. For GlobalProtect 5.1.x, upgrade to version 5.1.10 or later. 3. For GlobalProtect 6.0.x, upgrade to version 6.0.7 or later. 4. For GlobalProtect 6.1.x, upgrade to version 6.1.5 or later. 5. For GlobalProtect 6.2.x, upgrade to version 6.2.4 or later. 6. For GlobalProtect 6.3.0, upgrade to version 6.3.1 or later. 7. Implement the principle of least privilege to limit user access rights. 8. Monitor system activities and logs for any suspicious behavior. 9. Implement additional access controls and authentication mechanisms where possible.
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:A/V:D/RE:M/U:Amber
Feedly found the first article mentioning CVE-2024-5915. See article
Feedly estimated the CVSS score as MEDIUM
CVE-2024-5915 is a critical local privilege escalation vulnerability in the GlobalProtect app for Windows, with a high risk of system-wide compromise. This flaw allows a local user to execute programs with elevated privileges, potentially leading to administrative control over the system. There are currently no proof-of-concept exploits available, but users are advised to apply patches or mitigations provided by the vendor to prevent exploitation. See article