Palo Alto Networks GlobalProtect Agent is prone to a local privilege-escalation vulnerability. Local attackers may exploit this issue to gain elevated privileges on the affected system. Versions prior to Palo Alto Networks GlobalProtect agent 4.1.13 and 5.0.5 for Linux and Mac platforms are vulnerable.
Permit local access for trusted individuals only. Where possible, use restricted environments and restricted shells.
Allow only trusted and accountable individuals to have local interactive access to the vulnerable computer.
To limit the consequences of successful exploits, run the server in a closed or restricted environment.
To limit the impact of a successful exploit, run server software with the least privileges required and in restricted environments while still maintaining functionality.
Updates are available. Please see the references or vendor advisory for more information.