Multiple improper certificate validation vulnerabilities in the Palo Alto Networks GlobalProtectâ„¢ app enables an attacker to intercept encrypted communications and potentially compromise the endpoint. This can enable a local non-administrative operating system user or an attacker on the same subnet to redirect traffic to an unauthorized server and facilitate the installation of malicious software. The GlobalProtect app on Linux, Windows, iOS and GlobalProtect UWP app are not affected.
History

Wed, 13 May 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 13 May 2026 19:15:00 +0000

Type Values Removed Values Added
Description Multiple improper certificate validation vulnerabilities in the Palo Alto Networks GlobalProtectâ„¢ app enables an attacker to intercept encrypted communications and potentially compromise the endpoint. This can enable a local non-administrative operating system user or an attacker on the same subnet to redirect traffic to an unauthorized server and facilitate the installation of malicious software. The GlobalProtect app on Linux, Windows, iOS and GlobalProtect UWP app are not affected.
Title GlobalProtect App: Certificate Validation Bypass Vulnerabilities
First Time appeared Palo Alto Networks
Palo Alto Networks globalprotect App
Weaknesses CWE-295
CPEs cpe:2.3:a:palo_alto_networks:globalprotect_app:*:*:*:*:*:Android:*:*
cpe:2.3:a:palo_alto_networks:globalprotect_app:*:*:*:*:*:ChromeOS:*:*
cpe:2.3:a:palo_alto_networks:globalprotect_app:*:*:*:*:*:macOS:*:*
Vendors & Products Palo Alto Networks
Palo Alto Networks globalprotect App
References
Metrics cvssV4_0

{'score': 4.9, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/AU:N/R:U/V:D/RE:M/U:Amber'}


cve-icon MITRE

Status: PUBLISHED

Assigner: palo_alto

Published:

Updated: 2026-05-13T19:31:30.865Z

Reserved: 2025-11-03T20:44:09.928Z

Link: CVE-2026-0249

cve-icon Vulnrichment

Updated: 2026-05-13T19:31:25.892Z

cve-icon NVD

Status : Received

Published: 2026-05-13T19:16:59.073

Modified: 2026-05-13T19:16:59.073

Link: CVE-2026-0249

cve-icon Redhat

No data.