An insufficient certification validation issue in the Palo Alto Networks GlobalProtect app enables attackers to connect the GlobalProtect app to arbitrary servers. This can enable a local non-administrative operating system user or an attacker on the same subnet to install malicious root certificates on the endpoint and subsequently install malicious software signed by the malicious root certificates on that endpoint.
Please subscribe to our RSS feed https://security.paloaltonetworks.com/rss.xml to be alerted to new updates to this and other advisories.
References
| Link | Resource |
|---|---|
| https://blog.amberwolf.com/blog/2024/november/palo-alto-globalprotect---code-execution-and-privilege-escalation-via-malicious-vpn-server-cve-2024-5921/ | Technical Description Exploit Third Party Advisory |
| https://github.com/AmberWolfCyber/NachoVPN | Not Applicable |
| https://security.paloaltonetworks.com/CVE-2024-5921 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2024-11-27 04:15
Updated : 2025-06-27 16:55
NVD link : CVE-2024-5921
Mitre link : CVE-2024-5921
CVE.ORG link : CVE-2024-5921
JSON object : View
Products Affected
paloaltonetworks
- globalprotect
CWE
CWE-295
Improper Certificate Validation
