CVE-2025-4617

N/A Unknown

📋 TL;DR

A local privilege bypass vulnerability in Palo Alto Networks Prisma Browser on Windows allows non-admin users to circumvent screenshot controls. This enables unauthorized screen capture despite security policies. Only Windows installations with locally authenticated non-admin users are affected.

💻 Affected Systems

Products:
  • Palo Alto Networks Prisma Browser
Versions: Specific versions not specified in advisory
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows installations where browser self-protection is not enabled. Requires locally authenticated non-admin user access.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sensitive information displayed in the browser could be captured and exfiltrated by malicious local users, potentially exposing confidential data.

🟠

Likely Case

Local users bypass screenshot restrictions to capture browser content they shouldn't have access to, violating data protection policies.

🟢

If Mitigated

With browser self-protection enabled, screenshot controls function as intended, preventing unauthorized screen capture.

🌐 Internet-Facing: LOW - This is a local privilege bypass requiring authenticated local access.
🏢 Internal Only: MEDIUM - Internal users with local access could exploit this to bypass security controls and capture restricted content.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access and knowledge of the bypass method. No public exploit code has been disclosed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in advisory - check vendor documentation

Vendor Advisory: https://security.paloaltonetworks.com/CVE-2025-4617

Restart Required: Yes

Instructions:

1. Update Prisma Browser to latest version
2. Enable browser self-protection feature
3. Restart browser and verify screenshot controls are functioning

🔧 Temporary Workarounds

Enable Browser Self-Protection

windows

Activate the built-in browser self-protection feature to enforce screenshot controls

Enable via Prisma Browser security settings or group policy

🧯 If You Can't Patch

  • Enable browser self-protection feature immediately
  • Restrict local non-admin access to systems running Prisma Browser

🔍 How to Verify

Check if Vulnerable:

Check if browser self-protection is disabled on Windows installations with non-admin users

Check Version:

Check browser version in settings or via 'prisma-browser --version' command

Verify Fix Applied:

Verify browser self-protection is enabled and test screenshot functionality with non-admin account

📡 Detection & Monitoring

Log Indicators:

  • Failed screenshot attempts by non-admin users
  • Browser self-protection disable events

Network Indicators:

  • Unusual screenshot capture activity from non-admin accounts

SIEM Query:

Search for events where non-admin users attempt screenshot operations on Prisma Browser

🔗 References

📤 Share & Export