An insufficient certification validation issue in the Palo Alto Networks GlobalProtect app enables attackers to connect the GlobalProtect app to arbitrary servers. This can enable a local non-administrative operating system user or an attacker on the same subnet to install malicious root certificates on the endpoint and subsequently install malicious software signed by the malicious root certificates on that endpoint.
Please subscribe to our RSS feed https://security.paloaltonetworks.com/rss.xml to be alerted to new updates to this and other advisories.
References
Link | Resource |
---|---|
https://blog.amberwolf.com/blog/2024/november/palo-alto-globalprotect---code-execution-and-privilege-escalation-via-malicious-vpn-server-cve-2024-5921/ | Technical Description Exploit Third Party Advisory |
https://github.com/AmberWolfCyber/NachoVPN | Not Applicable |
https://security.paloaltonetworks.com/CVE-2024-5921 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
27 Jun 2025, 16:55
Type | Values Removed | Values Added |
---|---|---|
References | () https://blog.amberwolf.com/blog/2024/november/palo-alto-globalprotect---code-execution-and-privilege-escalation-via-malicious-vpn-server-cve-2024-5921/ - Technical Description, Exploit, Third Party Advisory | |
References | () https://github.com/AmberWolfCyber/NachoVPN - Not Applicable | |
References | () https://security.paloaltonetworks.com/CVE-2024-5921 - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
CPE | cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:iphone_os:*:* cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:windows:*:* cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:android:*:* cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:macos:*:* cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:linux:*:* |
|
First Time |
Paloaltonetworks globalprotect
Paloaltonetworks |
20 Feb 2025, 23:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
Summary | (en) An insufficient certification validation issue in the Palo Alto Networks GlobalProtect app enables attackers to connect the GlobalProtect app to arbitrary servers. This can enable a local non-administrative operating system user or an attacker on the same subnet to install malicious root certificates on the endpoint and subsequently install malicious software signed by the malicious root certificates on that endpoint. Please subscribe to our RSS feed https://security.paloaltonetworks.com/rss.xml to be alerted to new updates to this and other advisories. |
27 Nov 2024, 04:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-11-27 04:15
Updated : 2025-06-27 16:55
NVD link : CVE-2024-5921
Mitre link : CVE-2024-5921
CVE.ORG link : CVE-2024-5921
JSON object : View
Products Affected
paloaltonetworks
- globalprotect
CWE
CWE-295
Improper Certificate Validation