GlobalProtect App: Improper Certificate Validation Leads to Privilege Escalation
An insufficient certificate validation flaw in Palo Alto Networks GlobalProtect app allows attackers to impersonate the legitimate GlobalProtect server. A local non-administrative user or an attacker on the same network subnet can exploit this to install malicious root certificates on the endpoint. Once a fake root certificate is installed, the attacker can sign and deploy malicious software that appears legitimate to the system. Windows versions 6.3.3-h2+, 6.2.8-h3+, and UWP 6.0.12+ have fixes available. Linux versions of GlobalProtect have no vendor patch available.
- Local user account on the affected Windows or Linux system (non-administrative)
- Network access to the same subnet as the target endpoint (for on-subnet attacks)
- Ability to run a malicious server that responds to GlobalProtect connection attempts
Patching may require device reboot — plan for process interruption
/api/v1/advisories/75532891-4143-4a85-bc66-2d8fc5094747Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.