Company
Date Published
Author
Palo Alto Networks
Word count
3931
Language
English
Hacker News points
None

Summary

CrowdStrike's blog discusses a vulnerability in the Palo Alto Networks GlobalProtect VPN client that affects both Linux and macOS systems, allowing unprivileged users to escalate their privileges to root or SYSTEM. The vulnerability, identified as CVE-2019-17436, involves the manipulation of symbolic links and the encryption scheme used by the PanGPS component, which creates root-owned configuration files in user directories. To exploit this, users can overwrite critical system files like `/etc/ld.so.preload` on Linux or the root crontab on macOS, thereby executing unauthorized operations with elevated privileges. The blog details the technical steps and conditions needed to exploit this flaw, emphasizing the importance of understanding the encryption and file creation processes to achieve privilege escalation. Fixed versions of the software were released in 2019, and the blog credits Palo Alto Networks for their prompt handling of the issue.