Palo Alto GlobalProtect Agent Privilege Escalation (CVE-2024-2432)

medium Nessus Plugin ID 192152

Synopsis

A VPN client installed on remote host is affected by a privilege escalation vulnerability.

Description

A privilege escaltaion vulnerability in the Palo Alto Networks GlobalProtect app on Windows devices enables a local user to execute programs with elevated privileges. However, execution requires that the local user is able to successfully exploit a race condition.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Palo Alto GlobalProtect Agent 5.1.12 / 6.0.8 / 6.1.2 / 6.2.1 or later

See Also

https://security.paloaltonetworks.com/CVE-2024-2432

Plugin Details

Severity: Medium

ID: 192152

File Name: palo_alto_globalprotect_agent_cve-2024-2432.nasl

Version: 1.1

Type: local

Agent: windows

Family: Misc.

Published: 3/15/2024

Updated: 3/18/2024

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.2

CVSS v2

Risk Factor: Low

Base Score: 3.5

Temporal Score: 2.6

Vector: CVSS2#AV:L/AC:H/Au:S/C:P/I:P/A:P

CVSS Score Source: CVE-2024-2432

CVSS v3

Risk Factor: Medium

Base Score: 4.5

Temporal Score: 3.9

Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:paloaltonetworks:globalprotect

Required KB Items: SMB/Registry/Enumerated, installed_sw/Palo Alto GlobalProtect Agent

Exploit Ease: No known exploits are available

Patch Publication Date: 3/13/2024

Vulnerability Publication Date: 3/13/2024

Reference Information

CVE: CVE-2024-2432

IAVA: 2024-A-0170