CVE-2020-1989Incorrect Privilege Assignment in Palo Alto Networks Global Protect Agent

Severity
7.8HIGHNVD
CNA7.0
EPSS
0.1%
top 70.85%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 8
Latest updateMay 24

Description

An incorrect privilege assignment vulnerability when writing application-specific files in the Palo Alto Networks Global Protect Agent for Linux on ARM platform allows a local authenticated user to gain root privileges on the system. This issue affects Palo Alto Networks Global Protect Agent for Linux 5.0 versions before 5.0.8; 5.1 versions before 5.1.1.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages3 packages

🔴Vulnerability Details

2
GHSA
GHSA-35xw-gh3h-mxj5: An incorrect privilege assignment vulnerability when writing application-specific files in the Palo Alto Networks Global Protect Agent for Linux on AR2022-05-24
CVEList
Global Protect Agent: Incorrect privilege assignment allows local privilege escalation2020-04-08

📋Vendor Advisories

1
Palo Alto
GlobalProtect App: Incorrect privilege assignment allows local privilege escalation2020-04-08

💬Community

1
Bugzilla
CVE-2020-6750 glib: Mishandling of proxy_addr field in GSocketClient may lead to proxy being ignored2020-01-13
CVE-2020-1989 — Incorrect Privilege Assignment in Palo | cvebase