An incorrect privilege management vulnerability in the OPSWAT MetaDefender Endpoint Security SDK used by the Palo Alto Networks GlobalProtectâ„¢ app on Windows devices allows a locally authenticated non-administrative Windows user to escalate their privileges to NT AUTHORITY\SYSTEM. However, execution requires that the local user also successfully exploits a race condition, which makes this vulnerability difficult to exploit.
History

Thu, 15 May 2025 20:00:00 +0000

Type Values Removed Values Added
References

Wed, 14 May 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 14 May 2025 18:30:00 +0000

Type Values Removed Values Added
Description An incorrect privilege management vulnerability in the OPSWAT MetaDefender Endpoint Security SDK used by the Palo Alto Networks GlobalProtectâ„¢ app on Windows devices allows a locally authenticated non-administrative Windows user to escalate their privileges to NT AUTHORITY\SYSTEM. However, execution requires that the local user also successfully exploits a race condition, which makes this vulnerability difficult to exploit.
Title GlobalProtect App: Incorrect Privilege Management Vulnerability in OPSWAT MetaDefender Endpoint Security SDK
Weaknesses CWE-266
References
Metrics cvssV4_0

{'score': 7.1, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H/AU:N/R:U/V:D/U:Amber'}


cve-icon MITRE

Status: PUBLISHED

Assigner: palo_alto

Published: 2025-05-14T18:06:45.870Z

Updated: 2025-05-15T19:48:57.673Z

Reserved: 2024-12-20T23:23:31.911Z

Link: CVE-2025-0131

cve-icon Vulnrichment

Updated: 2025-05-14T20:52:26.477Z

cve-icon NVD

Status : Received

Published: 2025-05-14T19:15:51.233

Modified: 2025-05-15T20:16:01.707

Link: CVE-2025-0131

cve-icon Redhat

No data.