{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-5915","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","state":"PUBLISHED","assignerShortName":"palo_alto","dateReserved":"2024-06-12T15:27:56.748Z","datePublished":"2024-08-14T16:40:41.840Z","dateUpdated":"2024-08-20T13:20:36.459Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","platforms":["Windows"],"product":"GlobalProtect App","vendor":"Palo Alto Networks","versions":[{"status":"affected","version":"5.1"},{"status":"affected","version":"6.0"},{"changes":[{"at":"6.1.5","status":"unaffected"}],"lessThan":"6.1.5","status":"affected","version":"6.1","versionType":"custom"},{"changes":[{"at":"6.2.4","status":"unaffected"}],"lessThan":"6.2.4","status":"affected","version":"6.2","versionType":"custom"},{"changes":[{"at":"6.3.1","status":"unaffected"}],"lessThan":"6.3.1","status":"affected","version":"6.3","versionType":"custom"}]}],"credits":[{"lang":"en","type":"finder","value":"Ashutosh Gautam/JumpThere"},{"lang":"en","type":"finder","value":"Maciej Miszczyk of Logitech"},{"lang":"en","type":"finder","value":"Will Dormann of ANALYGENCE"},{"lang":"en","type":"finder","value":"Farid Zerrouk"},{"lang":"en","type":"finder","value":"Alaa Kachouh"},{"lang":"en","type":"finder","value":"Ali Jammal"}],"datePublic":"2024-08-14T16:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"A privilege escalation (PE) vulnerability in the Palo Alto Networks GlobalProtect app on Windows devices enables a local user to execute programs with elevated privileges."}],"value":"A privilege escalation (PE) vulnerability in the Palo Alto Networks GlobalProtect app on Windows devices enables a local user to execute programs with elevated privileges."}],"exploits":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.<br>"}],"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue."}],"impacts":[{"capecId":"CAPEC-233","descriptions":[{"lang":"en","value":"CAPEC-233 Privilege Escalation"}]}],"metrics":[{"cvssV4_0":{"Automatable":"NO","Recovery":"AUTOMATIC","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"PRESENT","attackVector":"LOCAL","baseScore":5.2,"baseSeverity":"MEDIUM","privilegesRequired":"LOW","providerUrgency":"AMBER","subAvailabilityImpact":"HIGH","subConfidentialityImpact":"HIGH","subIntegrityImpact":"HIGH","userInteraction":"NONE","valueDensity":"DIFFUSE","vectorString":"CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:H/SI:H/SA:H/AU:N/R:A/V:D/RE:M/U:Amber","version":"4.0","vulnAvailabilityImpact":"NONE","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"LOW","vulnerabilityResponseEffort":"MODERATE"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-732","description":"CWE-732 Incorrect Permission Assignment for Critical Resource","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto","dateUpdated":"2024-08-14T16:40:41.840Z"},"references":[{"url":"https://security.paloaltonetworks.com/CVE-2024-5915"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"This issue is fixed in GlobalProtect app 5.1.x (ETA: December 2024), GlobalProtect app 6.0.x (ETA: November 2024), GlobalProtect app 6.1.5, GlobalProtect app 6.2.4, GlobalProtect app 6.3.1 (ETA: end of August), and all later GlobalProtect app versions on Windows.<br>"}],"value":"This issue is fixed in GlobalProtect app 5.1.x (ETA: December 2024), GlobalProtect app 6.0.x (ETA: November 2024), GlobalProtect app 6.1.5, GlobalProtect app 6.2.4, GlobalProtect app 6.3.1 (ETA: end of August), and all later GlobalProtect app versions on Windows."}],"source":{"defect":["GPC-14958","GPC-19883"],"discovery":"EXTERNAL"},"timeline":[{"lang":"en","time":"2024-08-14T16:00:00.000Z","value":"Initial publication"}],"title":"GlobalProtect App: Local Privilege Escalation (PE) Vulnerability","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"affected":[{"vendor":"paloaltonetworks","product":"globalprotect","cpes":["cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:*:*:*"],"defaultStatus":"unaffected","versions":[{"version":"5.1","status":"affected"},{"version":"6.0","status":"affected"},{"version":"6.1","status":"affected","lessThan":"6.1.5","versionType":"custom"},{"version":"6.2","status":"affected","lessThan":"6.2.4","versionType":"custom"},{"version":"6.3","status":"affected","lessThan":"6.3.1","versionType":"custom"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-08-17T03:55:16.725264Z","id":"CVE-2024-5915","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-08-20T13:20:36.459Z"}}]}}