A vulnerability in the Palo Alto Networks GlobalProtect...
Moderate severity
Unreviewed
Published
Mar 12, 2025
to the GitHub Advisory Database
•
Updated Mar 12, 2025
Description
Published by the National Vulnerability Database
Mar 12, 2025
Published to the GitHub Advisory Database
Mar 12, 2025
Last updated
Mar 12, 2025
A vulnerability in the Palo Alto Networks GlobalProtect app on Windows allows a remote attacker to run ActiveX controls within the context of an authenticated Windows user. This enables the attacker to run commands as if they are a legitimate authenticated user. However, to exploit this vulnerability, the authenticated user must navigate to a malicious page during the GlobalProtect SAML login process on a Windows device.
This issue does not apply to the GlobalProtect app on other (non-Windows) platforms.
References