### [CVE-2024-9473](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9473) ![](https://img.shields.io/static/v1?label=Product&message=GlobalProtect%20App&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=5.1%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=5.1.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=6.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=6.0.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=6.1%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=6.1.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=6.2.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=6.3%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=6.3.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-250%20Execution%20with%20Unnecessary%20Privileges&color=brightgreen) ### Description A privilege escalation vulnerability in the Palo Alto Networks GlobalProtect app on Windows allows a locally authenticated non-administrative Windows user to escalate their privileges to NT AUTHORITY/SYSTEM through the use of the repair functionality offered by the .msi file used to install GlobalProtect. ### POC #### Reference - https://sec-consult.com/vulnerability-lab/advisory/local-privilege-escalation-via-msi-installer-in-palo-alto-networks-globalprotect/ - https://security.paloaltonetworks.com/CVE-2024-9473 #### Github - https://github.com/fkie-cad/nvd-json-data-feeds