CVE-2025-0118
HIGHPalo Alto Networks GlobalProtect <Windows - Privilege Escalation
Title source: llmDescription
A vulnerability in the Palo Alto Networks GlobalProtect app on Windows allows a remote attacker to run ActiveX controls within the context of an authenticated Windows user. This enables the attacker to run commands as if they are a legitimate authenticated user. However, to exploit this vulnerability, the authenticated user must navigate to a malicious page during the GlobalProtect SAML login process on a Windows device. This issue does not apply to the GlobalProtect app on other (non-Windows) platforms.
References (1)
Core 1
Core References
Vendor Advisory vendor-advisory
https://security.paloaltonetworks.com/CVE-2025-0118
Scores
CVSS v3
8.0
EPSS
0.0099
EPSS Percentile
77.1%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
total
Details
CWE
CWE-618
Status
published
Products (1)
paloaltonetworks/globalprotect
6.0.0 - 6.0.11
Published
Mar 12, 2025
Tracked Since
Feb 18, 2026