CVE-2026-0250 GlobalProtect App: Buffer Overflow Vulnerability during connection to Portal or Gateway
Exploit Maturity
UNREPORTED
Response Effort
MODERATE
Recovery
USER
Value Density
DIFFUSE
Attack Vector
ADJACENT
Attack Complexity
LOW
Attack Requirements
PRESENT
Automatable
NO
User Interaction
NONE
Product Confidentiality
HIGH
Product Integrity
HIGH
Product Availability
HIGH
Privileges Required
NONE
Subsequent Confidentiality
NONE
Subsequent Integrity
NONE
Subsequent Availability
NONE
Description
A buffer overflow vulnerability exists in the Palo Alto Networks GlobalProtect™ app that enables a man in the middle attacker to disrupt system processes and potentially execute arbitrary code with SYSTEM privileges. This vulnerability is triggered during the processing of requests and responses exchanged between Portal and Gateway.
The GlobalProtect app on iOS is not affected.
Product Status
| Versions | Affected | Unaffected |
|---|---|---|
| GlobalProtect App | None on iOS | All on iOS |
| GlobalProtect App 6.3 | < 6.3.3-h9 (6.3.3-999) on Windows < 6.3.3-h9 (6.3.3-999) on macOS < 6.3.3-h2 (6.3.3-42) on Linux | >= 6.3.3-h9 (6.3.3-999) on Windows >= 6.3.3-h9 (6.3.3-999) on macOS >= 6.3.3-h2 (6.3.3-42) on Linux |
| GlobalProtect App 6.2 | < 6.2.8-h10 (6.2.8-948) on Windows < 6.2.8-h10 (6.2.8-948) on macOS | >= 6.2.8-h10 (6.2.8-948) on Windows >= 6.2.8-h10 (6.2.8-948) on macOS |
| GlobalProtect App 6.1 | < 6.1.13 on Android < 6.1.13 on ChromeOS | >= 6.1.13 on Android >= 6.1.13 on ChromeOS |
| GlobalProtect App 6.0 | < 6.0.11 on Linux < 6.0.13 on Windows < 6.0.13 on macOS < 6.0.14 on Android < 6.0.14 on ChromeOS | >= 6.0.11 on Linux (ETA: 06/04) >= 6.0.13 on Windows >= 6.0.13 on macOS >= 6.0.14 on Android (ETA: 05/20) >= 6.0.14 on ChromeOS (ETA: 05/20) |
| GlobalProtect UWP App 6.3 | < 6.3.3-h10 on Windows | >= 6.3.3-h10 on Windows (ETA: 06/04) |
Required Configuration for Exposure
No special configuration is required to be affected by this issue.
Severity: MEDIUM, Suggested Urgency: MODERATE
CVSS-BT: 5.2 / CVSS-B: 7.7 (CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/AU:N/R:U/V:D/RE:M/U:Amber)
Exploitation Status
Palo Alto Networks is not aware of any malicious exploitation of this issue.
Weakness Type and Impact
Solution
| Version | Minor Version | Suggested Solution |
|---|---|---|
| GlobalProtect App 6.3 on Windows | 6.3.0 through 6.3.3-h8 | Upgrade to 6.3.3-h9 (6.3.3-999) or later. |
| GlobalProtect App 6.2 on Windows | 6.2.0 through 6.2.8-h9 | Upgrade to 6.2.8-h10 (6.2.8-948) or later. |
| GlobalProtect App 6.0 on Windows | 6.0.0 through 6.0.12 | Upgrade to 6.0.13 or later. |
| GlobalProtect App 6.0 on Linux | 6.0.0 through 6.0.10 | Upgrade to 6.0.11 or later. |
| GlobalProtect App 6.2/6.3 on Linux | 6.2.0 through 6.3.3-h1 | Upgrade to 6.3.3-h2 (6.3.3-42) or later. |
| GlobalProtect App 6.3 on macOS | 6.3.0 through 6.3.3-h8 | Upgrade to 6.3.3-h9 (6.3.3-999) or later. |
| GlobalProtect App 6.2 on macOS | 6.2.0 through 6.2.8-h9 | Upgrade to 6.2.8-h10 (6.2.8-948) or later. |
| GlobalProtect App 6.0 on macOS | 6.0.0 through 6.0.12 | Upgrade to 6.0.13 or later. |
| GlobalProtect App 6.1 on Android | 6.1.0 through 6.1.12 | Upgrade to 6.1.13 or later. |
| GlobalProtect App 6.0 on Android | 6.0.0 through 6.0.13 | Upgrade to 6.0.14 or later. |
| GlobalProtect App 6.1 on ChromeOS | 6.1.0 through 6.1.12 | Upgrade to 6.1.13 or later. |
| GlobalProtect App 6.0 on ChromeOS | 6.0.0 through 6.0.13 | Upgrade to 6.0.14 or later. |
| GlobalProtect UWP App | 6.1.0 through 6.3.3-h9 | Upgrade to 6.3.3-h10 or later. |
| GlobalProtect App on iOS | No action needed |
Workarounds and Mitigations
No known workarounds exist for this issue.
Acknowledgments
Palo Alto Networks thanks our internal security research teams for discovering and reporting this issue.
CPE Applicability
- cpe:2.3:a:palo_alto_networks:globalprotect_app:*:*:*:*:*:Windows:*:* is vulnerable from (including)6.3.3 and up to (excluding)6.3.3-h9_(6.3.3-999)
- ORcpe:2.3:a:palo_alto_networks:globalprotect_app:*:*:*:*:*:macOS:*:* is vulnerable from (including)6.3.3 and up to (excluding)6.3.3-h9_(6.3.3-999)
- ORcpe:2.3:a:palo_alto_networks:globalprotect_app:*:*:*:*:*:Windows:*:* is vulnerable from (including)6.2.8 and up to (excluding)6.2.8-h10_(6.2.8-948)
- ORcpe:2.3:a:palo_alto_networks:globalprotect_app:*:*:*:*:*:macOS:*:* is vulnerable from (including)6.2.8 and up to (excluding)6.2.8-h10_(6.2.8-948)
- or
- cpe:2.3:a:palo_alto_networks:globalprotect_app:*:*:*:*:*:Android:*:* is vulnerable from (including)6.1.0 and up to (excluding)6.1.13
- ORcpe:2.3:a:palo_alto_networks:globalprotect_app:*:*:*:*:*:ChromeOS:*:* is vulnerable from (including)6.1.0 and up to (excluding)6.1.13
- or
- cpe:2.3:a:palo_alto_networks:globalprotect_app:*:*:*:*:*:Linux:*:* is vulnerable from (including)6.3.3 and up to (excluding)6.3.3-h2_(6.3.3-42)
- ORcpe:2.3:a:palo_alto_networks:globalprotect_app:*:*:*:*:*:Linux:*:* is vulnerable from (including)6.0.0 and up to (excluding)6.0.11
- or
- cpe:2.3:a:palo_alto_networks:globalprotect_app:*:*:*:*:*:Windows:*:* is vulnerable from (including)6.0.0 and up to (excluding)6.0.13
- ORcpe:2.3:a:palo_alto_networks:globalprotect_app:*:*:*:*:*:macOS:*:* is vulnerable from (including)6.0.0 and up to (excluding)6.0.13
- or
- cpe:2.3:a:palo_alto_networks:globalprotect_app:*:*:*:*:*:Android:*:* is vulnerable from (including)6.0.0 and up to (excluding)6.0.14
- ORcpe:2.3:a:palo_alto_networks:globalprotect_app:*:*:*:*:*:ChromeOS:*:* is vulnerable from (including)6.0.0 and up to (excluding)6.0.14
- or
- cpe:2.3:a:palo_alto_networks:globalprotect_uwp_app:*:*:*:*:*:Windows:*:* is vulnerable from (including)6.3.3 and up to (excluding)6.3.3-h10
Timeline
Initial Publication.