CVE-2024-5921
HIGHPaloaltonetworks Globalprotect - Improper Certificate Validation
Title source: ruleDescription
An insufficient certification validation issue in the Palo Alto Networks GlobalProtect app enables attackers to connect the GlobalProtect app to arbitrary servers. This can enable a local non-administrative operating system user or an attacker on the same subnet to install malicious root certificates on the endpoint and subsequently install malicious software signed by the malicious root certificates on that endpoint. Please subscribe to our RSS feed https://security.paloaltonetworks.com/rss.xml to be alerted to new updates to this and other advisories.
References (3)
Core 3
Core References
Vendor Advisory vendor-advisory
https://security.paloaltonetworks.com/CVE-2024-5921
Exploit, Technical Description, Third Party Advisory exploit
https://blog.amberwolf.com/blog/2024/november/palo-alto-globalprotect---code-execution-and-privilege-escalation-via-malicious-vpn-server-cve-2024-5921/
Scores
CVSS v3
8.8
EPSS
0.0038
EPSS Percentile
59.2%
Attack Vector
ADJACENT_NETWORK
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
total
Details
CWE
CWE-295
Status
published
Products (4)
paloaltonetworks/globalprotect
6.1.0 - 6.1.6
paloaltonetworks/globalprotect
6.1.0 - 6.1.7
paloaltonetworks/globalprotect
6.1.0 - 6.2.1
paloaltonetworks/globalprotect
6.1.0 - 6.2.6 (2 CPE variants)
Published
Nov 27, 2024
Tracked Since
Feb 18, 2026