Логотип exploitDog
bind:CVE-2025-0120
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-0120

Количество 3

Количество 3

nvd логотип

CVE-2025-0120

4 месяца назад

A vulnerability with a privilege management mechanism in the Palo Alto Networks GlobalProtect™ app on Windows devices allows a locally authenticated non-administrative Windows user to escalate their privileges to NT AUTHORITY\SYSTEM. However, execution requires that the local user can also successfully exploit a race condition, which makes this vulnerability difficult to exploit.

CVSS3: 7
EPSS: Низкий
github логотип

GHSA-gg8q-gxm4-v22c

4 месяца назад

A vulnerability with a privilege management mechanism in the Palo Alto Networks GlobalProtect™ app on Windows devices allows a locally authenticated non-administrative Windows user to escalate their privileges to NT AUTHORITY\SYSTEM. However, execution requires that the local user can also successfully exploit a race condition, which makes this vulnerability difficult to exploit.

CVSS3: 7
EPSS: Низкий
fstec логотип

BDU:2025-09221

4 месяца назад

Уязвимость программного средства для обеспечения безопасного удаленного доступа к данным Palo Alto Networks GlobalProtect App, связанная с ошибками при управлении привилегиями, позволяющая нарушителю повысить свои привилегии

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-0120

A vulnerability with a privilege management mechanism in the Palo Alto Networks GlobalProtect™ app on Windows devices allows a locally authenticated non-administrative Windows user to escalate their privileges to NT AUTHORITY\SYSTEM. However, execution requires that the local user can also successfully exploit a race condition, which makes this vulnerability difficult to exploit.

CVSS3: 7
0%
Низкий
4 месяца назад
github логотип
GHSA-gg8q-gxm4-v22c

A vulnerability with a privilege management mechanism in the Palo Alto Networks GlobalProtect™ app on Windows devices allows a locally authenticated non-administrative Windows user to escalate their privileges to NT AUTHORITY\SYSTEM. However, execution requires that the local user can also successfully exploit a race condition, which makes this vulnerability difficult to exploit.

CVSS3: 7
0%
Низкий
4 месяца назад
fstec логотип
BDU:2025-09221

Уязвимость программного средства для обеспечения безопасного удаленного доступа к данным Palo Alto Networks GlobalProtect App, связанная с ошибками при управлении привилегиями, позволяющая нарушителю повысить свои привилегии

CVSS3: 7.8
0%
Низкий
4 месяца назад

Уязвимостей на страницу