CVE-2026-0249 PUBLISHED

GlobalProtect App: Certificate Validation Bypass Vulnerabilities

Assigner: palo_alto
Reserved: 03.11.2025 Published: 13.05.2026 Updated: 13.05.2026

Multiple improper certificate validation vulnerabilities in the Palo Alto Networks GlobalProtect™ app enables an attacker to intercept encrypted communications and potentially compromise the endpoint. This can enable a local non-administrative operating system user or an attacker on the same subnet to redirect traffic to an unauthorized server and facilitate the installation of malicious software.

The GlobalProtect app on Linux, Windows, iOS and GlobalProtect UWP app are not affected.

Metrics

CVSS Vector: CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/AU:N/R:U/V:D/RE:M/U:Amber
CVSS Score: 4.9

Product Status

Vendor Palo Alto Networks
Product GlobalProtect App
Versions Default: unaffected
  • affected from 6.3.0 to 6.3.3-h9 (6.3.3-999) (excl.)
  • affected from 6.2.0 to 6.2.8-h10 (6.2.8-948) (excl.)
Vendor Palo Alto Networks
Product GlobalProtect App
Versions Default: unaffected
  • affected from 6.1.0 to 6.1.13 (excl.)
  • affected from 6.0.0 to 6.0.14 (excl.)
Vendor Palo Alto Networks
Product GlobalProtect App
Versions Default: unaffected
  • affected from 6.0.0 to 6.0.13 (excl.)
Vendor Palo Alto Networks
Product GlobalProtect App
Versions Default: unaffected
  • Version All is unaffected

Exploits

Palo Alto Networks is not aware of any malicious exploitation of these issues.

Credits

  • Palo Alto Networks thanks Kakao Corp. Service Security Team and our internal security research teams for discovering and reporting this issue. other

References

Problem Types

  • CWE-295 Improper Certificate Validation CWE

Impacts

  • CAPEC-94 Adversary in the Middle (AiTM)