Lucene search

K
PaloaltonetworksGlobalprotect

5 matches found

CVE
CVE
added 2025/06/13 12:15 a.m.72 views

CVE-2025-4232

An improper neutralization of wildcards vulnerability in the log collection feature of Palo Alto Networks GlobalProtect™ app on macOS allows a non administrative user to escalate their privileges to root.

8.8CVSS6.6AI score0.0004EPSS
CVE
CVE
added 2025/04/11 2:15 a.m.66 views

CVE-2025-0120

A vulnerability with a privilege management mechanism in the Palo Alto Networks GlobalProtect™ app on Windows devices allows a locally authenticated non-administrative Windows user to escalate their privileges to NT AUTHORITY\SYSTEM. However, execution requires that the local user can also successf...

7.1CVSS6.5AI score0.0002EPSS
CVE
CVE
added 2025/03/12 7:15 p.m.52 views

CVE-2025-0118

A vulnerability in the Palo Alto Networks GlobalProtect app on Windows allows a remote attacker to run ActiveX controls within the context of an authenticated Windows user. This enables the attacker to run commands as if they are a legitimate authenticated user. However, to exploit this vulnerabili...

8CVSS6.5AI score0.00129EPSS
CVE
CVE
added 2025/06/13 6:15 a.m.36 views

CVE-2025-4227

An improper access control vulnerability in the Endpoint Traffic Policy Enforcement https://docs.paloaltonetworks.com/globalprotect/6-0/globalprotect-app-new-features/new-features-released-in-gp-app/endpoint-traffic-policy-enforcement feature of the Palo Alto Networks GlobalProtect™ app allows cert...

3.5CVSS6.7AI score0.00009EPSS
CVE
CVE
added 2025/05/14 7:15 p.m.31 views

CVE-2025-0135

An incorrect privilege assignment vulnerability in the Palo Alto Networks GlobalProtect™ App on macOS devices enables a locally authenticated non administrative user to disable the app. The GlobalProtect app on Windows, Linux, iOS, Android, Chrome OS and GlobalProtect UWP app are not affected.

5.2CVSS6.3AI score0.00018EPSS