An incorrect privilege management vulnerability in the OPSWAT MetaDefender Endpoint Security SDK used by the Palo Alto Networks GlobalProtectâ„¢ app on Windows devices allows a locally authenticated non-administrative Windows user to escalate their privileges to NT AUTHORITY\SYSTEM. However, execution requires that the local user also successfully exploits a race condition, which makes this vulnerability difficult to exploit.
Metrics
Affected Vendors & Products
References
History
Thu, 15 May 2025 20:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Wed, 14 May 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 14 May 2025 18:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An incorrect privilege management vulnerability in the OPSWAT MetaDefender Endpoint Security SDK used by the Palo Alto Networks GlobalProtectâ„¢ app on Windows devices allows a locally authenticated non-administrative Windows user to escalate their privileges to NT AUTHORITY\SYSTEM. However, execution requires that the local user also successfully exploits a race condition, which makes this vulnerability difficult to exploit. | |
Title | GlobalProtect App: Incorrect Privilege Management Vulnerability in OPSWAT MetaDefender Endpoint Security SDK | |
Weaknesses | CWE-266 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: palo_alto
Published: 2025-05-14T18:06:45.870Z
Updated: 2025-05-15T19:48:57.673Z
Reserved: 2024-12-20T23:23:31.911Z
Link: CVE-2025-0131

Updated: 2025-05-14T20:52:26.477Z

Status : Received
Published: 2025-05-14T19:15:51.233
Modified: 2025-05-15T20:16:01.707
Link: CVE-2025-0131

No data.