A vulnerability with a privilege management mechanism in the Palo Alto Networks GlobalProtect™ app on Windows devices allows a locally authenticated non-administrative Windows user to escalate their privileges to NT AUTHORITY\SYSTEM. However, execution requires that the local user can also successfully exploit a race condition, which makes this vulnerability difficult to exploit.
References
Link | Resource |
---|---|
https://security.paloaltonetworks.com/CVE-2025-0120 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
27 Jun 2025, 16:51
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.0 |
References | () https://security.paloaltonetworks.com/CVE-2025-0120 - Vendor Advisory | |
CPE | cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:windows:*:* | |
First Time |
Paloaltonetworks globalprotect
Paloaltonetworks |
11 Apr 2025, 15:39
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
11 Apr 2025, 02:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-04-11 02:15
Updated : 2025-06-27 16:51
NVD link : CVE-2025-0120
Mitre link : CVE-2025-0120
CVE.ORG link : CVE-2025-0120
JSON object : View
Products Affected
paloaltonetworks
- globalprotect
CWE
CWE-250
Execution with Unnecessary Privileges