GlobalProtect App: Privilege Escalation (PE) Vulnerability
An incorrect privilege assignment vulnerability in Palo Alto Networks GlobalProtect App allows a locally authenticated non-administrative user to escalate their privileges to root on macOS and Linux, or NT AUTHORITY\SYSTEM on Windows. This vulnerability affects GlobalProtect App versions before 6.3.3-h1 (6.3.3-c650) on macOS and Windows, before 6.2.8-h2 (6.2.8-c243) on macOS and Windows, before 6.2.8 on Linux, and before 6.0.12 on macOS and Windows. GlobalProtect UWP App on all platforms and GlobalProtect App on Linux are not receiving fixes. The vulnerability does not affect iOS, Android, or Chrome OS versions.
- Valid local user account on the device (non-administrative)
- Vulnerable GlobalProtect App installed and running on macOS, Windows, or Linux
- Physical or network access to the device to execute local commands
Patching may require device reboot — plan for process interruption
/api/v1/advisories/cb077b40-9403-49d7-946f-07d808a202f9Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.