Skip to main content

CVE-2025-0135: CWE-266: Incorrect Privilege Assignment in Palo Alto Networks GlobalProtect App

Medium
VulnerabilityCVE-2025-0135cvecve-2025-0135cwe-266
Published: Wed May 14 2025 (05/14/2025, 18:08:32 UTC)
Source: CVE
Vendor/Project: Palo Alto Networks
Product: GlobalProtect App

Description

An incorrect privilege assignment vulnerability in the Palo Alto Networks GlobalProtect™ App on macOS devices enables a locally authenticated non administrative user to disable the app. The GlobalProtect app on Windows, Linux, iOS, Android, Chrome OS and GlobalProtect UWP app are not affected.

AI-Powered Analysis

AILast updated: 07/06/2025, 13:10:20 UTC

Technical Analysis

CVE-2025-0135 is a medium-severity vulnerability identified in the Palo Alto Networks GlobalProtect App specifically on macOS devices. The vulnerability stems from an incorrect privilege assignment (CWE-266) that allows a locally authenticated non-administrative user to disable the GlobalProtect VPN client. This flaw is present in versions 6.0.0 through 6.3.0 of the macOS GlobalProtect App. The vulnerability does not affect GlobalProtect versions on Windows, Linux, iOS, Android, Chrome OS, or the UWP app. The CVSS 4.0 base score is 5.2, reflecting a medium impact with local attack vector, low attack complexity, no privileges required beyond local user access, and partial user interaction needed. The vulnerability impacts availability primarily by enabling a non-privileged user to disable the VPN client, potentially disrupting secure network connectivity. Confidentiality and integrity impacts are rated as low to medium since disabling the VPN could allow subsequent network traffic to bypass secure channels, increasing exposure to interception or manipulation. Exploitation requires local access to the macOS device but no administrative privileges, making it easier for an insider threat or malware running with user-level permissions to exploit. No known exploits are currently in the wild, and no patches have been linked yet. The vulnerability is significant in environments where GlobalProtect is used to enforce secure remote access policies on macOS endpoints, as disabling the VPN could circumvent security controls and expose sensitive corporate resources.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to the availability and security of remote access infrastructure. Many enterprises and government agencies in Europe rely on GlobalProtect for secure VPN connectivity, especially with increased remote work trends. If a non-administrative user or malware can disable the VPN client on macOS devices, it could lead to unprotected network traffic, increasing the risk of data interception or lateral movement within corporate networks. This could result in data breaches or compliance violations under regulations such as GDPR, which mandates protection of personal data. The impact is heightened in sectors with stringent security requirements like finance, healthcare, and critical infrastructure. Additionally, disruption of VPN services could impair business continuity and remote workforce productivity. Since the vulnerability requires local access, the threat is more relevant in scenarios where endpoint devices are shared, physically accessible by multiple users, or susceptible to local malware infections.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Monitor and restrict local user permissions on macOS endpoints to prevent unauthorized users from gaining access to devices or elevating privileges. 2) Implement endpoint detection and response (EDR) solutions to detect attempts to disable or tamper with the GlobalProtect client. 3) Enforce strict device control policies, including full disk encryption and secure boot, to reduce the risk of local compromise. 4) Educate users about the risks of local tampering and ensure that macOS devices are physically secured, especially in shared or public environments. 5) Apply any forthcoming patches from Palo Alto Networks promptly once available. 6) Consider deploying additional network-level controls such as multi-factor authentication and network access control (NAC) to limit exposure if VPN clients are disabled. 7) Regularly audit VPN client status and connectivity to detect anomalies indicating potential tampering. These measures go beyond generic advice by focusing on local user control, monitoring, and layered security to address the specific nature of this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
palo_alto
Date Reserved
2024-12-20T23:24:28.176Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682cd0fb1484d88663aec825

Added to database: 5/20/2025, 6:59:07 PM

Last enriched: 7/6/2025, 1:10:20 PM

Last updated: 8/18/2025, 11:34:09 PM

Views: 25

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats