SentinelOne
CVE Vulnerability Database

CVE-2024-9473: GlobalProtect Privilege Escalation Flaw

CVE-2024-9473 is a privilege escalation vulnerability in Palo Alto Networks GlobalProtect app on Windows that lets non-admin users gain SYSTEM privileges via MSI repair. This article covers technical details, impact, and mitigation.

Updated:

CVE-2024-9473 Overview

A privilege escalation vulnerability in the Palo Alto Networks GlobalProtect app on Windows allows a locally authenticated non-administrative Windows user to escalate their privileges to NT AUTHORITY/SYSTEM through the use of the repair functionality offered by the .msi file used to install GlobalProtect.

Critical Impact

This vulnerability can lead to unauthorized access at the highest privilege level on Windows systems, potentially allowing attackers to execute arbitrary code and install malware.

Affected Products

  • Palo Alto Networks GlobalProtect (all versions)
  • GlobalProtect 6.3.0
  • GlobalProtect 6.3.1

Discovery Timeline

  • Not Available - Vulnerability discovered by Not Available
  • Not Available - Responsible disclosure to Palo Alto Networks
  • Not Available - CVE CVE-2024-9473 assigned
  • Not Available - Palo Alto Networks releases security patch
  • 2024-10-09 - CVE CVE-2024-9473 published to NVD
  • 2024-11-21 - Last updated in NVD database

Technical Details for CVE-2024-9473

Vulnerability Analysis

The vulnerability resides in the repair function of the .msi installer for GlobalProtect. By leveraging the repair process, a local user without administrative privileges can execute commands with SYSTEM level privileges. This is due to improper access control and validation checks within the installation package.

Root Cause

The root cause of the vulnerability is an improper access control mechanism within the repair functionality of the GlobalProtect .msi installer. This oversight enables privilege escalation when reapplying the repair option.

Attack Vector

The attack vector is local. A local user with valid authentication credentials can initiate the exploit by triggering the repair process of the installed GlobalProtect application.

powershell
# Example exploitation code
Start-Process msiexec.exe -ArgumentList '/fa "C:\Path\to\GlobalProtect.msi" /qn' -Verb runAs

Detection Methods for CVE-2024-9473

Indicators of Compromise

  • Unexpected modification or repair actions on the GlobalProtect .msi
  • Unscheduled privilege elevation events
  • System changes initiated by non-administrative accounts

Detection Strategies

Utilize security monitoring tools to detect unusual MSI execution or repair operations. Monitor event logs for elevation attempts and correlate with user activity logs to determine unauthorized privilege escalations.

Monitoring Recommendations

Enable logging for MSI installer operations and privilege changes. Set alerts for operations involving GlobalProtect-related files and privilege adjustments on Windows endpoints.

How to Mitigate CVE-2024-9473

Immediate Actions Required

  • Audit and review user accounts to ensure principle of least privilege.
  • Disable the repair functionality for non-administrative users.
  • Monitor for MSI installer executions closely.

Patch Information

Palo Alto Networks is expected to release a patch addressing this privilege escalation vulnerability. Always refer to the Vendor Advisory for the most up-to-date patch information.

Workarounds

Implement Group Policy to restrict access to MSI installer options for non-administrative users as an interim measure while awaiting official patches.

bash
# Configuration example to disable MSI repair functionality
New-ItemProperty -Path "HKLM:\Software\Policies\Microsoft\Windows\Installer" -Name "DisableMSI" -Value 1 -PropertyType "DWord"

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.