An insufficient certification validation issue in the Palo Alto Networks GlobalProtect app enables attackers to connect the GlobalProtect app to arbitrary servers. This can enable a local non-administrative operating system user or an attacker on the same subnet to install malicious root certificates on the endpoint and subsequently install malicious software signed by the malicious root certificates on that endpoint.
Please subscribe to our RSS feed https://security.paloaltonetworks.com/rss.xml to be alerted to new updates to this and other advisories.
References
Link | Resource |
---|---|
https://blog.amberwolf.com/blog/2024/november/palo-alto-globalprotect---code-execution-and-privilege-escalation-via-malicious-vpn-server-cve-2024-5921/ | Technical Description Exploit Third Party Advisory |
https://github.com/AmberWolfCyber/NachoVPN | Not Applicable |
https://security.paloaltonetworks.com/CVE-2024-5921 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
27 Jun 2025, 16:55
Type | Values Removed | Values Added |
---|---|---|
First Time |
Paloaltonetworks globalprotect
Paloaltonetworks |
|
CPE | cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:macos:*:* cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:linux:*:* cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:windows:*:* cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:iphone_os:*:* cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:android:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
References | () https://blog.amberwolf.com/blog/2024/november/palo-alto-globalprotect---code-execution-and-privilege-escalation-via-malicious-vpn-server-cve-2024-5921/ - Technical Description, Exploit, Third Party Advisory | |
References | () https://github.com/AmberWolfCyber/NachoVPN - Not Applicable | |
References | () https://security.paloaltonetworks.com/CVE-2024-5921 - Vendor Advisory |
20 Feb 2025, 23:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) An insufficient certification validation issue in the Palo Alto Networks GlobalProtect app enables attackers to connect the GlobalProtect app to arbitrary servers. This can enable a local non-administrative operating system user or an attacker on the same subnet to install malicious root certificates on the endpoint and subsequently install malicious software signed by the malicious root certificates on that endpoint. Please subscribe to our RSS feed https://security.paloaltonetworks.com/rss.xml to be alerted to new updates to this and other advisories. |
Information
Published : 2024-11-27 04:15
Updated : 2025-06-27 16:55
NVD link : CVE-2024-5921
Mitre link : CVE-2024-5921
CVE.ORG link : CVE-2024-5921
JSON object : View
Products Affected
paloaltonetworks
- globalprotect
CWE
CWE-295
Improper Certificate Validation