CVE-2026-0251 PUBLISHED

GlobalProtect App: Local Privilege Escalation Vulnerabilities

Assigner: palo_alto
Reserved: 03.11.2025 Published: 13.05.2026 Updated: 14.05.2026

Multiple local privilege escalation vulnerabilities in the Palo Alto Networks GlobalProtect™ app allow a local user to escalate their privileges to NT AUTHORITY\SYSTEM on Windows and root on macOS and Linux. This enables a non-administrative user to execute arbitrary commands with administrative privileges.

The GlobalProtect app on iOS, Android, Chrome OS and GlobalProtect UWP app are not affected.

Metrics

CVSS Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/AU:N/R:U/V:D/RE:M/U:Amber
CVSS Score: 5.9

Product Status

Vendor Palo Alto Networks
Product GlobalProtect App
Versions Default: unaffected
  • affected from 6.3.0 to 6.3.3-h9 (6.3.3-999) (excl.)
  • affected from 6.2.0 to 6.2.8-h10 (6.2.8-948) (excl.)
  • affected from 6.0.0 to 6.0.13 (excl.)
Vendor Palo Alto Networks
Product GlobalProtect App
Versions Default: unaffected
  • affected from 6.3.0 to 6.3.3-h9 (6.3.3-999) (excl.)
  • affected from 6.2.0 to 6.2.8-h10 (6.2.8-948) (excl.)
  • affected from 6.0.0 to 6.0.13 (excl.)
Vendor Palo Alto Networks
Product GlobalProtect App
Versions Default: unaffected
  • affected from 6.3.0 to 6.3.3-h2 (6.3.3-42) (excl.)
  • affected from 6.0.0 to 6.0.11 (excl.)
Vendor Palo Alto Networks
Product Global Protect App
Versions Default: unaffected
  • Version All is unaffected

Exploits

Palo Alto Networks is not aware of any malicious exploitation of these issues.

Credits

  • Palo Alto Networks thanks our internal security research teams for discovering and reporting this issue. other

References

Problem Types

  • CWE-426 Untrusted Search Path CWE

Impacts

  • CAPEC-233 Privilege Escalation