GlobalProtect Security Update Advisory (CVE-2024-5921)
Overview
We have released a security update to address a vulnerability in Palo Alto GlobalProtect. Users of affected products are advised to update to the latest version.
Affected Products
CVE-2024-5921
- GlobalProtect App version: All on Windows UWP
- GlobalProtect App 6.3 on Windows version: ~6.3.2* (excluded)
- GlobalProtect App 6.3 on macOS version: ~6.3.2* (excluded)
- GlobalProtect App 6.2 on Windows version: ~6.2.6* (excluded)
- GlobalProtect App 6.2 on macOS version: ~6.2.6-HF* (excluded)
- GlobalProtect App 6.2 on Linux version: ~6.2.1-HF2* (excluded)
- GlobalProtect App 6.1 on Android, macOS, Linux, Android versions: all versions
- GlobalProtect App 6.1 on iOS versions: 6.1.7* (excluded)
- GlobalProtect App 6.0 version: None in FiPS-CC mode
- GlobalProtect App 5.1 version: None in FiPS-CC mode
Resolved Vulnerabilities
Vulnerability that allows the app to connect to arbitrary servers due to lack of certificate validation (CVE-2024-5921)
Vulnerability Patches
vulnerability patches have been made available in the latest update. Please follow the instructions on the Referenced Sites to update to the latest Vulnerability Patches version.
CVE-2024-5921
- GlobalProtect App 6.3 on Windows version: 6.3.2* or higher
- GlobalProtect App 6.3 on macOS version: 6.3.2* or higher
- GlobalProtect App 6.2 on Windows version: 6.2.6* or higher
- GlobalProtect App 6.2 on macOS version: 6.2.6-HF* or higher
- GlobalProtect App 6.2 on Linux version: 6.2.1-HF2* or higher
- GlobalProtect App 6.1 on iOS version: 6.1.7* or higher
- GlobalProtect App 6.0 version: ALL in FiPS-CC mode
- GlobalProtect App 5.1 version: ALL in FiPS-CC mode
References
[1] CVE-2024-5921 GlobalProtect App: Insufficient Certificate Validation Leads to Privilege Escalation
https://security.paloaltonetworks.com/CVE-2024-5921