We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A vulnerability in the Palo Alto Networks GlobalProtect app on Windows allows a remote attacker to run ActiveX controls within the context of an authenticated Windows user. This enables the attacker to run commands as if they are a legitimate authenticated user. However, to exploit this vulnerability, the authenticated user must navigate to a malicious page during the GlobalProtect SAML login process on a Windows device. This issue does not apply to the GlobalProtect app on other (non-Windows) platforms.
Reserved 2024-12-20 | Published 2025-03-12 | Updated 2025-03-12 | Assigner palo_altoAn attacker deceives an authenticated Windows user and entices the user to navigate to a malicious web page during the GlobalProtect SAML login process.
CWE-618 Exposed Unsafe ActiveX Method
Maxime ESCOURBIAC, Michelin CERT
Yassine BENGANA, Abicom for Michelin CERT
security.paloaltonetworks.com/CVE-2025-0118
Support options