Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-9473— GlobalProtect App: Local Privilege Escalation (PE) Vulnerability

EPSS 0.32% · P55
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-9473

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
GlobalProtect App: Local Privilege Escalation (PE) Vulnerability
Source: NVD (National Vulnerability Database)
Vulnerability Description
A privilege escalation vulnerability in the Palo Alto Networks GlobalProtect app on Windows allows a locally authenticated non-administrative Windows user to escalate their privileges to NT AUTHORITY/SYSTEM through the use of the repair functionality offered by the .msi file used to install GlobalProtect.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
带着不必要的权限执行
Source: NVD (National Vulnerability Database)
Vulnerability Title
Palo Alto Networks GlobalProtect 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Palo Alto Networks GlobalProtect是美国Palo Alto Networks公司的一套网络防护软件。该软件可提供防火墙监控及威胁预防等功能。 Palo Alto Networks GlobalProtect存在安全漏洞。攻击者利用该漏洞可以提升权限。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Palo Alto NetworksGlobalProtect App 5.1 cpe:2.3:a:paloaltonetworks:globalprotect_app:6.3.1:-:*:*:*:*:*:*

II. Public POCs for CVE-2024-9473

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-9473

登录查看更多情报信息。

Same Patch Batch · Palo Alto Networks · 2024-10-09 · 10 CVEs total

CVE-2024-9463Expedition: Unauthenticated OS Command Injection Vulnerability Leads to Firewall Credentia
CVE-2024-9464Expedition: Authenticated OS Command Injection Vulnerability Leads to Firewall Admin Crede
CVE-2024-9465Expedition: SQL Injection Leads to Firewall Admin Credential Disclosure
CVE-2024-9466Expedition: Cleartext Storage of Information Leads to Firewall Admin Credential Disclosure
CVE-2024-9467Expedition: Reflected Cross-Site Scripting Vulnerability Leads to Expedition Session Discl
CVE-2024-9468PAN-OS: Firewall Denial of Service (DoS) via a Maliciously Crafted Packet
CVE-2024-9469Cortex XDR Agent: Local Windows User Can Disable the Agent
CVE-2024-9470Cortex XSOAR: Information Disclosure Vulnerability
CVE-2024-9471PAN-OS: Privilege Escalation (PE) Vulnerability in XML API

IV. Related Vulnerabilities

V. Comments for CVE-2024-9473

No comments yet


Leave a comment