{ "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", "CVE_data_meta": { "ID": "CVE-2025-0118", "ASSIGNER": "psirt@paloaltonetworks.com", "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the Palo Alto Networks GlobalProtect app on Windows allows a remote attacker to run ActiveX controls within the context of an authenticated Windows user. This enables the attacker to run commands as if they are a legitimate authenticated user. However, to exploit this vulnerability, the authenticated user must navigate to a malicious page during the GlobalProtect SAML login process on a Windows device.\n\nThis issue does not apply to the GlobalProtect app on other (non-Windows) platforms." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-618 Exposed Unsafe ActiveX Method", "cweId": "CWE-618" } ] } ] }, "affects": { "vendor": { "vendor_data": [ { "vendor_name": "Palo Alto Networks", "product": { "product_data": [ { "product_name": "GlobalProtect App", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "versions": [ { "changes": [ { "at": "6.3.3", "status": "unaffected" } ], "lessThan": "6.3.3", "status": "unaffected", "version": "6.3.0", "versionType": "custom" }, { "changes": [ { "at": "6.2.5", "status": "unaffected" } ], "lessThan": "6.2.5", "status": "affected", "version": "6.2.0", "versionType": "custom" }, { "changes": [ { "at": "6.1.6", "status": "unaffected" } ], "lessThan": "6.1.6", "status": "affected", "version": "6.1.0", "versionType": "custom" }, { "changes": [ { "at": "6.0.10", "status": "unaffected" } ], "lessThan": "6.0.10", "status": "affected", "version": "6.0.0", "versionType": "custom" } ], "defaultStatus": "unaffected" } }, { "version_value": "not down converted", "x_cve_json_5_version_data": { "versions": [ { "changes": [ { "at": "6.3.3", "status": "unaffected" } ], "lessThan": "6.3.3", "status": "unaffected", "version": "All", "versionType": "custom" } ], "defaultStatus": "unaffected" } } ] } }, { "product_name": "GlobalProtect UWP App", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "versions": [ { "status": "unaffected", "version": "All", "versionType": "custom" } ], "defaultStatus": "unaffected" } } ] } } ] } } ] } }, "references": { "reference_data": [ { "url": "https://security.paloaltonetworks.com/CVE-2025-0118", "refsource": "MISC", "name": "https://security.paloaltonetworks.com/CVE-2025-0118" } ] }, "generator": { "engine": "Vulnogram 0.1.0-dev" }, "source": { "defect": [ "GPC-19859" ], "discovery": "EXTERNAL" }, "configuration": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "You are vulnerable to this issue only if you configured GlobalProtect authentication to use SAML authentication.

You can verify whether you configured SAML authentication on your GlobalProtect portals by checking your firewall web interface (Network > GlobalProtect > Portals > (portal-config) > Authentication)." } ], "value": "You are vulnerable to this issue only if you configured GlobalProtect authentication to use SAML authentication.\n\nYou can verify whether you configured SAML authentication on your GlobalProtect portals by checking your firewall web interface (Network > GlobalProtect > Portals > (portal-config) > Authentication)." } ], "work_around": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "You can mitigate this issue by using a different form of authentication for the GlobalProtect portal such as Client Certificate Authentication, RADIUS, TACACS+, LDAP, or Kerberos. You can find information about configuring authentication for the GlobalProtect portal in this documentation." } ], "value": "You can mitigate this issue by using a different form of authentication for the GlobalProtect portal such as Client Certificate Authentication, RADIUS, TACACS+, LDAP, or Kerberos. You can find information about configuring authentication for the GlobalProtect portal in this documentation https://docs.paloaltonetworks.com/pan-os/11-1/pan-os-web-interface-help/globalprotect/network-globalprotect-portals/globalprotect-portals-authentication-configuration-tab ." } ], "exploit": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue." } ], "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue." } ], "solution": [ { "lang": "eng", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The issue is addressed by hardening the browser embedded in GlobalProtect app to disallow ActiveX plugins. This security enhancement is implemented in patched versions of the GlobalProtect app, so upgrading resolves the issue. 

Version
Suggested Solution
GlobalProtect App 6.3 on Windows
Upgrade to 6.3.3 or later
GlobalProtect App 6.2 on Windows
Upgrade to 6.2.5 or later
GlobalProtect App 6.1 on WindowsUpgrade to 6.1.6 or later
GlobalProtect App 6.0 on Windows
Upgrade to 6.0.10 or later
GlobalProtect App on macOSNo action needed
GlobalProtect App on LinuxNo action needed
GlobalProtect App on iOSNo action needed
GlobalProtect App on AndroidNo action needed
GlobalProtect UWP AppNo action needed
" } ], "value": "The issue is addressed by hardening the browser embedded in GlobalProtect app to disallow ActiveX plugins. This security enhancement is implemented in patched versions of the GlobalProtect app, so upgrading resolves the issue.\u00a0\n\nVersion\nSuggested Solution\nGlobalProtect App 6.3 on Windows\nUpgrade to 6.3.3 or later\nGlobalProtect App 6.2 on Windows\nUpgrade to 6.2.5 or later\nGlobalProtect App 6.1 on WindowsUpgrade to 6.1.6 or later\nGlobalProtect App 6.0 on Windows\nUpgrade to 6.0.10 or later\nGlobalProtect App on macOSNo action neededGlobalProtect App on LinuxNo action neededGlobalProtect App on iOSNo action neededGlobalProtect App on AndroidNo action neededGlobalProtect UWP AppNo action needed" } ], "credits": [ { "lang": "en", "value": "Maxime ESCOURBIAC, Michelin CERT" }, { "lang": "en", "value": "Yassine BENGANA, Abicom for Michelin CERT" } ] }