Description
A vulnerability in the Palo Alto Networks GlobalProtect app on Windows allows a remote attacker to run ActiveX controls within the context of an authenticated Windows user. This enables the attacker to run commands as if they are a legitimate authenticated user. However, to exploit this vulnerability, the authenticated user must navigate to a malicious page during the GlobalProtect SAML login process on a Windows device. This issue does not apply to the GlobalProtect app on other (non-Windows) platforms.
An attacker deceives an authenticated Windows user and entices the user to navigate to a malicious web page during the GlobalProtect SAML login process.
Problem types
CWE-618 Exposed Unsafe ActiveX Method
Product status
6.3.0 (custom) before 6.3.3
6.2.0 (custom) before 6.2.5
6.1.0 (custom) before 6.1.6
6.0.0 (custom) before 6.0.11
All (custom) before 6.3.3
All (custom)
Credits
Maxime ESCOURBIAC, Michelin CERT
Yassine BENGANA, Abicom for Michelin CERT
References
security.paloaltonetworks.com/CVE-2025-0118
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.