Remote Code Execution Vulnerability in Palo Alto Networks GlobalProtect on Windows
CVE-2025-0118

6MEDIUM

Key Information:

Vendor
CVE Published:
12 March 2025

Badges

👾 Exploit Exists

Summary

A vulnerability exists in the Palo Alto Networks GlobalProtect application on Windows that could allow a remote attacker to execute ActiveX controls within the session of an authenticated user. By navigating to a malicious web page during the SAML login process, an attacker could potentially execute unauthorized commands under the privileges of an authenticated user. This issue is specific to the Windows version, and users of other operating systems are not affected.

Affected Version(s)

GlobalProtect App Windows 6.2.0 < 6.2.5

GlobalProtect App Windows 6.1.0 < 6.1.6

GlobalProtect App Windows 6.0.0 < 6.0.11

References

CVSS V4

Score:
6
Severity:
MEDIUM
Confidentiality:
High
Integrity:
Low
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
Unknown

Timeline

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

Maxime ESCOURBIAC, Michelin CERT
Yassine BENGANA, Abicom for Michelin CERT
.