Cybersecurity Alert: VPN Bug Could Let Insiders Take Over Your Systems

The420.in Staff
2 Min Read

Palo Alto Networks has disclosed a critical security flaw in its GlobalProtect VPN application, used extensively by enterprises worldwide, that could allow locally authenticated users to escalate their privileges and gain administrative control over affected systems.

The vulnerability affects GlobalProtect versions running on Windows, macOS, and Linux platforms and enables non-administrative users with local access to escalate privileges to root (macOS/Linux) or NT AUTHORITY\SYSTEM(Windows). This escalation could potentially allow attackers to install malicious software, access sensitive system configurations, or establish persistent access.

“Centre for Police Technology” Launched as Common Platform for Police, OEMs, and Vendors to Drive Smart Policing

Patch Urgently Required: No Workaround Available

Classified as CWE-426 (Untrusted Search Path), the vulnerability has been assigned a CVSS base score of 8.4, reflecting its high potential impact. Palo Alto Networks confirmed that no workarounds or mitigations are currently available. Immediate patching is the only solution.

Impacted Versions:

  • GlobalProtect 6.3 (macOS/Windows): Upgrade to 6.3.3-h1 (6.3.3-c650) or later

  • GlobalProtect 6.2 (macOS/Windows): Upgrade to 6.2.8-h2 (6.2.8-c243) or later

  • GlobalProtect 6.2 (Linux): Upgrade to 6.2.8 or later (fix expected by July 11, 2025)

  • GlobalProtect 6.1 & 6.0 (All platforms): Immediate upgrade required to the latest patched version

 

Not Affected: iOS, Android, Chrome OS, and UWP versions of GlobalProtect.

Palo Alto Networks stated that no special configuration is needed for systems to be vulnerable, indicating that default installations are at risk. No known active exploitation has been reported so far.

Algoritha: The Most Trusted Name in BFSI Investigations and DFIR Services

Responsible Disclosure and Industry Response

Security researchers Alex Bourla and Graham Brereton discovered the vulnerability and responsibly disclosed it to Palo Alto Networks. The company has publicly acknowledged their contribution.

Given the widespread use of GlobalProtect in corporate environments, security professionals are urged to act swiftly. The potential for internal actors or malware exploiting this vulnerability makes immediate software updates critical to enterprise security.

Stay Connected