GlobalProtect App: Local Privilege Escalation Vulnerabilities
Multiple local privilege escalation vulnerabilities in the Palo Alto Networks GlobalProtect™ app allow a local user to escalate their privileges to NT AUTHORITY\SYSTEM on Windows and root on macOS and Linux. This enables a non-administrative user to execute arbitrary commands with administrative privileges.
The GlobalProtect app on iOS, Android, Chrome OS and GlobalProtect UWP app are not affected.
Problem Types
| Type | CWE ID | Description |
|---|
| CWE | CWE-426 | CWE-426 Untrusted Search Path |
Type: CWE
Description: CWE-426 Untrusted Search Path
Metrics
| Version | Base score | Base severity | Vector |
|---|
| 4.0 | 5.9 | MEDIUM | CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/AU:N/R:U/V:D/RE:M/U:Amber |
Version: 4.0
Base score: 5.9
Base severity: MEDIUM
Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/AU:N/R:U/V:D/RE:M/U:Amber
Impacts
| CAPEC ID | Description |
|---|
| CAPEC-233 | CAPEC-233 Privilege Escalation |
Description: CAPEC-233 Privilege Escalation
Timeline
| Event | Date |
|---|
| Initial publication. | 2026-05-13 16:00:00 |
Event: Initial publication.
Date: 2026-05-13 16:00:00