Palo Alto Networks has disclosed a critical security vulnerability in its GlobalProtect VPN application that enables locally authenticated users to escalate their privileges to root access on macOS and Linux systems, or NT AUTHORITY\SYSTEM on Windows machines. The security flaw affects multiple versions of the GlobalProtect app across Windows, macOS, and Linux platforms, allowing non-administrative users who already have local access to a system to gain complete administrative control. All installations of GlobalProtect versions 6.1 and 6.0 across macOS, Windows, and Linux platforms are affected and require immediate upgrades to the latest patched versions. The vulnerability was discovered and reported by security researchers Alex Bourla and Graham Brereton, whom Palo Alto Networks has acknowledged for their responsible disclosure. For version 6.3 users on macOS and Windows, systems running versions prior to 6.3.3-h1 (6.3.3-c650) are vulnerable and should upgrade immediately. The vulnerability, classified as an incorrect privilege assignment flaw, poses significant security risks for organizations relying on the popular enterprise VPN solution.
This Cyber News was published on cybersecuritynews.com. Publication date: Thu, 10 Jul 2025 16:30:15 +0000