CVE-2022-0016
📋 TL;DR
A local privilege escalation vulnerability in Palo Alto Networks GlobalProtect app's Connect Before Logon feature allows attackers to gain SYSTEM or root privileges under certain authentication conditions. This affects GlobalProtect app 5.2 versions earlier than 5.2.9 on Windows and macOS only. Local attackers can exploit this to gain complete system control.
💻 Affected Systems
- Palo Alto Networks GlobalProtect app
📦 What is this software?
Globalprotect by Paloaltonetworks
⚠️ Risk & Real-World Impact
Worst Case
Local attacker gains SYSTEM/root privileges, enabling complete system compromise, data theft, persistence installation, and lateral movement capabilities.
Likely Case
Local attacker with initial access escalates privileges to bypass security controls and install malware or steal sensitive data.
If Mitigated
With proper patching, the vulnerability is eliminated; with workarounds, attack surface is reduced but not completely removed.
🎯 Exploit Status
Requires local access and specific authentication conditions with Connect Before Logon feature.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: GlobalProtect app 5.2.9 or later
Vendor Advisory: https://security.paloaltonetworks.com/CVE-2022-0016
Restart Required: Yes
Instructions:
1. Download GlobalProtect app 5.2.9 or later from Palo Alto support portal. 2. Install update on all affected Windows and macOS endpoints. 3. Restart systems to complete installation.
🔧 Temporary Workarounds
Disable Connect Before Logon
allDisable the vulnerable Connect Before Logon feature to prevent exploitation.
GlobalProtect configuration: Set 'Connect Before Logon' to disabled
🧯 If You Can't Patch
- Disable Connect Before Logon feature in GlobalProtect configuration
- Restrict local access to affected systems and implement strict endpoint security controls
🔍 How to Verify
Check if Vulnerable:
Check GlobalProtect app version: On Windows: Control Panel > Programs > GlobalProtect; On macOS: About GlobalProtect in menu bar. If version is 5.2.x and less than 5.2.9, system is vulnerable.
Check Version:
Windows: wmic product where name="GlobalProtect" get version; macOS: /Applications/GlobalProtect.app/Contents/MacOS/GlobalProtect --version
Verify Fix Applied:
Verify GlobalProtect app version is 5.2.9 or higher using same version check method.
📡 Detection & Monitoring
Log Indicators:
- Failed or unusual authentication attempts with Connect Before Logon
- Privilege escalation events in system logs
- GlobalProtect service crashes or unexpected restarts
Network Indicators:
- Unusual authentication patterns to GlobalProtect gateway
SIEM Query:
EventID=4688 AND ProcessName="GlobalProtect.exe" AND CommandLine LIKE "%CBL%" OR EventID=4672 (Privilege escalation)