Palo Alto Networks Globalprotect App vulnerabilities
29 known vulnerabilities affecting palo_alto_networks/globalprotect_app.
Total CVEs
29
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH11MEDIUM17LOW1
Vulnerabilities
Page 1 of 2
CVE-2025-2183MEDIUMCVSS 5.3≥ 6.3.0, < 6.3.3-h2 (6.3.3-c676)≥ 6.2.0, < 6.2.8-h3 (6.2.8-c263)+4 more2025-08-13
CVE-2025-2183 [MEDIUM] CWE-295 CVE-2025-2183: An insufficient certificate validation issue in the Palo Alto Networks GlobalProtect™ app enables at
An insufficient certificate validation issue in the Palo Alto Networks GlobalProtect™ app enables attackers to connect the GlobalProtect app to arbitrary servers. This can enable a local non-administrative operating system user or an attacker on the same subnet to install malicious root certificates on the endpoint and subsequently install malicious s
cvelistv5nvd
CVE-2025-2179MEDIUMCVSS 6.8≥ 6.2.0, < 6.2.9v6.1.0+1 more2025-07-29
CVE-2025-2179 [MEDIUM] CWE-266 CVE-2025-2179: An incorrect privilege assignment vulnerability in the Palo Alto Networks GlobalProtect™ App on Linu
An incorrect privilege assignment vulnerability in the Palo Alto Networks GlobalProtect™ App on Linux devices enables a locally authenticated non administrative user to disable the app even if the GlobalProtect app configuration would not normally permit them to do so.
The GlobalProtect app on Windows, macOS, iOS, Android, Chrome OS and GlobalProtect
cvelistv5nvd
CVE-2025-0141HIGHCVSS 8.4≥ 6.3.0, < 6.3.3-h1 (6.3.3-c650)≥ 6.2.0, < 6.2.8-h2 (6.2.8-c243)+3 more2025-07-09
CVE-2025-0141 [HIGH] CWE-426 CVE-2025-0141: An incorrect privilege assignment vulnerability in the Palo Alto Networks GlobalProtect™ App on enab
An incorrect privilege assignment vulnerability in the Palo Alto Networks GlobalProtect™ App on enables a locally authenticated non administrative user to escalate their privileges to root on macOS and Linux or NT AUTHORITY\SYSTEM on Windows.
The GlobalProtect app on iOS, Android, Chrome OS and GlobalProtect UWP app are not affected.
cvelistv5nvd
CVE-2025-0140MEDIUMCVSS 6.8≥ 6.3.0, < 6.3.3-h1 (6.3.3-c650)≥ 6.2.0, < 6.2.8-h2 (6.2.8-c243)+2 more2025-07-09
CVE-2025-0140 [MEDIUM] CWE-266 CVE-2025-0140: An incorrect privilege assignment vulnerability in the Palo Alto Networks GlobalProtect™ App on macO
An incorrect privilege assignment vulnerability in the Palo Alto Networks GlobalProtect™ App on macOS devices enables a locally authenticated non administrative user to disable the app even if the GlobalProtect app configuration would not normally permit them to do so.
The GlobalProtect app on Windows, Linux, iOS, Android, Chrome OS and GlobalProtect
cvelistv5nvd
CVE-2025-4232HIGHCVSS 8.5≥ 6.3, < 6.3.3≥ 6.2.0, < 6.2.8-h2+2 more2025-06-13
CVE-2025-4232 [HIGH] CWE-155 CVE-2025-4232: An improper neutralization of wildcards vulnerability in the log collection feature of Palo Alto Net
An improper neutralization of wildcards vulnerability in the log collection feature of Palo Alto Networks GlobalProtect™ app on macOS allows a non administrative user to escalate their privileges to root.
cvelistv5nvd
CVE-2025-4227LOWCVSS 1.0≥ 6.3.0, < 6.3.2-566≥ 6.2.0, < 6.2.8-h2+2 more2025-06-13
CVE-2025-4227 [LOW] CWE-319 CVE-2025-4227: An improper access control vulnerability in the Endpoint Traffic Policy Enforcement https://docs.pa
An improper access control vulnerability in the Endpoint Traffic Policy Enforcement https://docs.paloaltonetworks.com/globalprotect/6-0/globalprotect-app-new-features/new-features-released-in-gp-app/endpoint-traffic-policy-enforcement feature of the Palo Alto Networks GlobalProtect™ app allows certain packets to remain unencrypted instead of being proper
cvelistv5nvd
CVE-2025-0135MEDIUMCVSS 5.2≥ 6.3.0, < 6.3.3≥ 6.2.0, < 6.2.8+2 more2025-05-14
CVE-2025-0135 [MEDIUM] CWE-266 CVE-2025-0135: An incorrect privilege assignment vulnerability in the Palo Alto Networks GlobalProtect™ App on macO
An incorrect privilege assignment vulnerability in the Palo Alto Networks GlobalProtect™ App on macOS devices enables a locally authenticated non administrative user to disable the app.
The GlobalProtect app on Windows, Linux, iOS, Android, Chrome OS and GlobalProtect UWP app are not affected.
cvelistv5nvd
CVE-2025-0120HIGHCVSS 7.1≥ 6.3.0, < 6.3.3≥ 6.2.0, < 6.2.8+2 more2025-04-11
CVE-2025-0120 [HIGH] CWE-250 CVE-2025-0120: A vulnerability with a privilege management mechanism in the Palo Alto Networks GlobalProtect™ app o
A vulnerability with a privilege management mechanism in the Palo Alto Networks GlobalProtect™ app on Windows devices allows a locally authenticated non-administrative Windows user to escalate their privileges to NT AUTHORITY\SYSTEM. However, execution requires that the local user can also successfully exploit a race condition, which makes this vulnerab
cvelistv5nvd
CVE-2025-0117HIGHCVSS 7.1≥ 6.3.0, < 6.3.3≥ 6.2.0, < 6.2.6+2 more2025-03-12
CVE-2025-0117 [HIGH] CWE-807 CVE-2025-0117: A reliance on untrusted input for a security decision in the GlobalProtect app on Windows devices po
A reliance on untrusted input for a security decision in the GlobalProtect app on Windows devices potentially enables a locally authenticated non-administrative Windows user to escalate their privileges to NT AUTHORITY\SYSTEM.
GlobalProtect App on macOS, Linux, iOS, Android, Chrome OS and GlobalProtect UWP App are not affected.
cvelistv5nvd
CVE-2025-0118MEDIUMCVSS 6.0≥ 6.2.0, < 6.2.5≥ 6.1.0, < 6.1.6+1 more2025-03-12
CVE-2025-0118 [MEDIUM] CWE-618 CVE-2025-0118: A vulnerability in the Palo Alto Networks GlobalProtect app on Windows allows a remote attacker to r
A vulnerability in the Palo Alto Networks GlobalProtect app on Windows allows a remote attacker to run ActiveX controls within the context of an authenticated Windows user. This enables the attacker to run commands as if they are a legitimate authenticated user. However, to exploit this vulnerability, the authenticated user must navigate to a maliciou
cvelistv5nvd
CVE-2024-5921HIGHCVSS 7.1≥ 6.3.0, < 6.3.2≥ 6.2.0, < 6.2.6+5 more2024-11-27
CVE-2024-5921 [HIGH] CWE-295 CVE-2024-5921: An insufficient certification validation issue in the Palo Alto Networks GlobalProtect app enables a
An insufficient certification validation issue in the Palo Alto Networks GlobalProtect app enables attackers to connect the GlobalProtect app to arbitrary servers. This can enable a local non-administrative operating system user or an attacker on the same subnet to install malicious root certificates on the endpoint and subsequently install malicious so
cvelistv5nvd
CVE-2024-9473MEDIUMCVSS 5.2v5.1v6.0+3 more2024-10-09
CVE-2024-9473 [MEDIUM] CWE-250 CVE-2024-9473: A privilege escalation vulnerability in the Palo Alto Networks GlobalProtect app on Windows allows a
A privilege escalation vulnerability in the Palo Alto Networks GlobalProtect app on Windows allows a locally authenticated non-administrative Windows user to escalate their privileges to NT AUTHORITY/SYSTEM through the use of the repair functionality offered by the .msi file used to install GlobalProtect.
cvelistv5nvd
CVE-2024-8687MEDIUMCVSS 6.9≥ 5.1.0, < 5.1.12≥ 5.2.0, < 5.2.13+3 more2024-09-11
CVE-2024-8687 [MEDIUM] CWE-497 CVE-2024-8687: An information exposure vulnerability exists in Palo Alto Networks PAN-OS software that enables a Gl
An information exposure vulnerability exists in Palo Alto Networks PAN-OS software that enables a GlobalProtect end user to learn both the configured GlobalProtect uninstall password and the configured disable or disconnect passcode. After the password or passcode is known, end users can uninstall, disable, or disconnect GlobalProtect even if the Glob
cvelistv5nvd
CVE-2024-5915MEDIUMCVSS 5.2v5.1v6.0+3 more2024-08-14
CVE-2024-5915 [MEDIUM] CWE-732 CVE-2024-5915: A privilege escalation (PE) vulnerability in the Palo Alto Networks GlobalProtect app on Windows dev
A privilege escalation (PE) vulnerability in the Palo Alto Networks GlobalProtect app on Windows devices enables a local user to execute programs with elevated privileges.
cvelistv5nvd
CVE-2024-5908MEDIUMCVSS 5.5≥ 5.1.0, < 5.1.12≥ 6.0.0, < 6.0.8+2 more2024-06-12
CVE-2024-5908 [MEDIUM] CWE-532 CVE-2024-5908: A problem with the Palo Alto Networks GlobalProtect app can result in exposure of encrypted user cre
A problem with the Palo Alto Networks GlobalProtect app can result in exposure of encrypted user credentials, used for connecting to GlobalProtect, in application logs. Normally, these application logs are only viewable by local users and are included when generating logs for troubleshooting purposes. This means that these encrypted credentials are ex
cvelistv5nvd
CVE-2024-2432HIGHCVSS 7.0≥ 5.1, < 5.1.12≥ 6.0, < 6.0.8+2 more2024-03-13
CVE-2024-2432 [HIGH] CWE-269 CVE-2024-2432: A privilege escalation (PE) vulnerability in the Palo Alto Networks GlobalProtect app on Windows dev
A privilege escalation (PE) vulnerability in the Palo Alto Networks GlobalProtect app on Windows devices enables a local user to execute programs with elevated privileges. However, execution requires that the local user is able to successfully exploit a race condition.
cvelistv5nvd
CVE-2024-2431MEDIUMCVSS 5.5≥ 6.0, < 6.0.4≥ 5.1, < 5.1.12+2 more2024-03-13
CVE-2024-2431 [MEDIUM] CWE-269 CVE-2024-2431: An issue in the Palo Alto Networks GlobalProtect app enables a non-privileged user to disable the Gl
An issue in the Palo Alto Networks GlobalProtect app enables a non-privileged user to disable the GlobalProtect app in configurations that allow a user to disable GlobalProtect with a passcode.
cvelistv5nvd
CVE-2023-0009HIGHCVSS 7.8≥ 6.1, < 6.1.1≥ 6.0, < 6.0.5+1 more2023-06-14
CVE-2023-0009 [HIGH] CWE-807 CVE-2023-0009: A local privilege escalation (PE) vulnerability in the Palo Alto Networks GlobalProtect app on Windo
A local privilege escalation (PE) vulnerability in the Palo Alto Networks GlobalProtect app on Windows enables a local user to execute programs with elevated privileges.
cvelistv5nvd
CVE-2023-0006MEDIUMCVSS 6.3≥ 6.0, < 6.0.4≥ 6.1, < 6.1.1+1 more2023-04-12
CVE-2023-0006 [MEDIUM] CWE-367 CVE-2023-0006: A local file deletion vulnerability in the Palo Alto Networks GlobalProtect app on Windows devices e
A local file deletion vulnerability in the Palo Alto Networks GlobalProtect app on Windows devices enables a user to delete system files from the endpoint with elevated privileges through a race condition.
cvelistv5nvd
CVE-2022-0017HIGHCVSS 7.8≥ 5.2, < 5.2.5≥ 5.1, < 5.1.102022-02-10
CVE-2022-0017 [HIGH] CWE-59 CVE-2022-0017: An improper link resolution before file access ('link following') vulnerability exists in the Palo A
An improper link resolution before file access ('link following') vulnerability exists in the Palo Alto Networks GlobalProtect app on Windows that enables a local attacker to disrupt system processes and potentially execute arbitrary code with SYSTEM privileges under certain circumstances. This issue impacts: GlobalProtect app 5.1 versions earlier than G
cvelistv5nvd
1 / 2Next →