GlobalProtect Security Update Advisory (CVE-2024-5921)

Overview

We have released a security update to address a vulnerability in Palo Alto GlobalProtect. Users of affected products are advised to update to the latest version.
 

 

Affected Products

 

CVE-2024-5921

  • GlobalProtect App version: All on Windows UWP
  • GlobalProtect App 6.3 on Windows version: ~6.3.2* (excluded)
  • GlobalProtect App 6.3 on macOS version: ~6.3.2* (excluded)
  • GlobalProtect App 6.2 on Windows version: ~6.2.6* (excluded)
  • GlobalProtect App 6.2 on macOS version: ~6.2.6-HF* (excluded)
  • GlobalProtect App 6.2 on Linux version: ~6.2.1-HF2* (excluded)
  • GlobalProtect App 6.1 on Android, macOS, Linux, Android versions: all versions
  • GlobalProtect App 6.1 on iOS versions: 6.1.7* (excluded)
  • GlobalProtect App 6.0 version: None in FiPS-CC mode
  • GlobalProtect App 5.1 version: None in FiPS-CC mode

 

 

Resolved Vulnerabilities

Vulnerability that allows the app to connect to arbitrary servers due to lack of certificate validation (CVE-2024-5921)

 

 

Vulnerability Patches

vulnerability patches have been made available in the latest update. Please follow the instructions on the Referenced Sites to update to the latest Vulnerability Patches version.

 

 

CVE-2024-5921

  • GlobalProtect App 6.3 on Windows version: 6.3.2* or higher
  • GlobalProtect App 6.3 on macOS version: 6.3.2* or higher
  • GlobalProtect App 6.2 on Windows version: 6.2.6* or higher
  • GlobalProtect App 6.2 on macOS version: 6.2.6-HF* or higher
  • GlobalProtect App 6.2 on Linux version: 6.2.1-HF2* or higher
  • GlobalProtect App 6.1 on iOS version: 6.1.7* or higher
  • GlobalProtect App 6.0 version: ALL in FiPS-CC mode
  • GlobalProtect App 5.1 version: ALL in FiPS-CC mode

 

 

References

[1] CVE-2024-5921 GlobalProtect App: Insufficient Certificate Validation Leads to Privilege Escalation
https://security.paloaltonetworks.com/CVE-2024-5921