CVE-2025-0120

A vulnerability with a privilege management mechanism in the Palo Alto Networks GlobalProtect™ app on Windows devices allows a locally authenticated non-administrative Windows user to escalate their privileges to NT AUTHORITY\SYSTEM. However, execution requires that the local user can also successfully exploit a race condition, which makes this vulnerability difficult to exploit.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:windows:*:*
cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:windows:*:*
cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:windows:*:*

History

27 Jun 2025, 16:51

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.0
First Time Paloaltonetworks
Paloaltonetworks globalprotect
References () https://security.paloaltonetworks.com/CVE-2025-0120 - () https://security.paloaltonetworks.com/CVE-2025-0120 - Vendor Advisory
CPE cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:windows:*:*

11 Apr 2025, 02:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-11 02:15

Updated : 2025-06-27 16:51


NVD link : CVE-2025-0120

Mitre link : CVE-2025-0120


JSON object : View

Products Affected

paloaltonetworks

  • globalprotect
CWE

No CWE.