The GlobalProtect app on Linux, Windows, iOS and GlobalProtect UWP app are not affected.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://security.paloaltonetworks.com/CVE-2026-0249 |
|
Wed, 13 May 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 13 May 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Multiple improper certificate validation vulnerabilities in the Palo Alto Networks GlobalProtect™ app enables an attacker to intercept encrypted communications and potentially compromise the endpoint. This can enable a local non-administrative operating system user or an attacker on the same subnet to redirect traffic to an unauthorized server and facilitate the installation of malicious software. The GlobalProtect app on Linux, Windows, iOS and GlobalProtect UWP app are not affected. | |
| Title | GlobalProtect App: Certificate Validation Bypass Vulnerabilities | |
| First Time appeared |
Palo Alto Networks
Palo Alto Networks globalprotect App |
|
| Weaknesses | CWE-295 | |
| CPEs | cpe:2.3:a:palo_alto_networks:globalprotect_app:*:*:*:*:*:Android:*:* cpe:2.3:a:palo_alto_networks:globalprotect_app:*:*:*:*:*:ChromeOS:*:* cpe:2.3:a:palo_alto_networks:globalprotect_app:*:*:*:*:*:macOS:*:* |
|
| Vendors & Products |
Palo Alto Networks
Palo Alto Networks globalprotect App |
|
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: palo_alto
Published:
Updated: 2026-05-13T19:31:30.865Z
Reserved: 2025-11-03T20:44:09.928Z
Link: CVE-2026-0249
Updated: 2026-05-13T19:31:25.892Z
Status : Received
Published: 2026-05-13T19:16:59.073
Modified: 2026-05-13T19:16:59.073
Link: CVE-2026-0249
No data.
OpenCVE Enrichment
Updated: 2026-05-13T20:30:04Z