CVE-2025-4232
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-06-13

Last updated on: 2025-06-27

Assigner: Palo Alto Networks, Inc.

Description
An improper neutralization of wildcards vulnerability in the log collection feature of Palo Alto Networks GlobalProtect™ app on macOS allows a non administrative user to escalate their privileges to root.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-06-13
Last Modified
2025-06-27
Generated
2026-05-06
AI Q&A
2025-06-13
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
paloaltonetworks globalprotect From 6.0.0 (inc) to 6.2.8 (exc)
paloaltonetworks globalprotect From 6.3.0 (inc) to 6.3.3 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-155 The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could be interpreted as wildcards or matching symbols when they are sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in the Palo Alto Networks GlobalProtect app on macOS involves improper neutralization of wildcards in the app's log collection feature. It allows an authenticated, non-administrative user to perform code injection, which leads to privilege escalation from a low-privilege user to root. This means a user without administrative rights can gain full control over the system by exploiting this flaw. [1]


How can this vulnerability impact me? :

The vulnerability can severely impact you by allowing a non-administrative user to escalate their privileges to root, compromising the confidentiality, integrity, and availability of the system. This could lead to unauthorized access, control over system resources, and potential disruption or manipulation of data and services. The attack requires low privileges, no user interaction, and has low complexity, making it a significant security risk. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by identifying if affected versions of the Palo Alto Networks GlobalProtect app on macOS are installed. A practical detection method is to check the installed GlobalProtect app version on macOS systems. For example, you can run the command: `pkgutil --pkg-info com.paloaltonetworks.globalprotect` or check the app version via Finder or system information. There are no specific network detection commands or signatures mentioned for this vulnerability. [1]


What immediate steps should I take to mitigate this vulnerability?

The immediate step to mitigate this vulnerability is to upgrade the Palo Alto Networks GlobalProtect app on macOS to version 6.3.3 or later, or 6.2.8-h2 (expected June 2025) or later. No other workarounds or mitigations are available. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart