{"vulnerability": "CVE-2025-0117", "sightings": [{"uuid": "30eea7b0-a944-4d75-aa7d-bf119218fe87", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0117", "type": "seen", "source": "https://security.paloaltonetworks.com/CVE-2025-0117", "content": "", "creation_timestamp": "2025-03-12T15:00:00.000000Z"}, {"uuid": "8f91dac2-39c1-44e4-be12-c5eac8434a1d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0117", "type": "seen", "source": "https://bsky.app/profile/ripjyr.bsky.social/post/3lk7bhwts332d", "content": "", "creation_timestamp": "2025-03-12T19:03:20.495204Z"}, {"uuid": "e8848fd8-9fb3-4f75-a0d1-4b2b9bab99dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0117", "type": "seen", "source": "MISP/682bdba3-46b7-4a8f-b7be-c6bf4b4f9868", "content": "", "creation_timestamp": "2025-08-13T13:26:34.000000Z"}, {"uuid": "6097cc9e-6533-49d0-85aa-5cf857bd8bc4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0117", "type": "seen", "source": "https://bsky.app/profile/ripjyr.bsky.social/post/3lljk7xdocw2r", "content": "", "creation_timestamp": "2025-03-29T14:31:45.095933Z"}, {"uuid": "a04edda9-5d04-483f-87c9-092fcfa99e99", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0117", "type": "seen", "source": "https://bsky.app/profile/ripjyr.bsky.social/post/3lml4uptl4z2c", "content": "", "creation_timestamp": "2025-04-11T23:03:20.855467Z"}, {"uuid": "0fdcd303-5a57-4241-af5d-5470ea73b776", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0117", "type": "seen", "source": "https://bsky.app/profile/ripjyr.bsky.social/post/3lo4yrwhaws2a", "content": "", "creation_timestamp": "2025-05-01T19:03:19.097017Z"}, {"uuid": "47119986-bc0d-4992-9499-61de8e9d71a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0117", "type": "seen", "source": "https://bsky.app/profile/ripjyr.bsky.social/post/3lusqgaicb427", "content": "", "creation_timestamp": "2025-07-25T19:03:20.971397Z"}, {"uuid": "cd949263-fdd5-4873-9d6c-3a46224d2739", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0117", "type": "seen", "source": "https://bsky.app/profile/ripjyr.bsky.social/post/3lw7ysuck7s23", "content": "", "creation_timestamp": "2025-08-12T19:03:22.774577Z"}, {"uuid": "9ed5ebee-debb-49a8-aafb-18f486738227", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0117", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7358", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-0117\n\ud83d\udd25 CVSS Score: 7.1 (cvssV4_0, Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H/AU:N/R:U/V:D/RE:M/U:Amber)\n\ud83d\udd39 Description: A reliance on untrusted input for a security decision in the GlobalProtect app on Windows devices potentially enables a locally authenticated non-administrative Windows user to escalate their privileges to NT AUTHORITY\\SYSTEM.\n\nGlobalProtect App on Linux, iOS, Android, Chrome OS and GlobalProtect UWP App are not affected.\n\ud83d\udccf Published: 2025-03-12T18:35:35.409Z\n\ud83d\udccf Modified: 2025-03-12T18:35:35.409Z\n\ud83d\udd17 References:\n1. https://security.paloaltonetworks.com/CVE-2025-0117", "creation_timestamp": "2025-03-12T18:40:43.000000Z"}, {"uuid": "9435f644-2353-4006-8e27-1f66f83167f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0117", "type": "seen", "source": "https://bsky.app/profile/ripjyr.bsky.social/post/3m23n32dlel2n", "content": "", "creation_timestamp": "2025-09-30T23:03:19.793059Z"}, {"uuid": "4eea04c4-3257-4138-9f53-36d35ee72fa1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0117", "type": "seen", "source": "https://t.me/cvedetector/20174", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-0117 - Pulse Secure GlobalProtect Windows Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-0117 \nPublished : March 12, 2025, 7:15 p.m. | 1\u00a0hour, 49\u00a0minutes ago \nDescription : A reliance on untrusted input for a security decision in the GlobalProtect app on Windows devices potentially enables a locally authenticated non-administrative Windows user to escalate their privileges to NT AUTHORITY\\SYSTEM.  \n  \nGlobalProtect App on macOS, Linux, iOS, Android, Chrome OS and GlobalProtect UWP App are not affected. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-12T22:53:51.000000Z"}]}