Palo Alto Networks Security Advisories / CVE-2026-0250

CVE-2026-0250 GlobalProtect App: Buffer Overflow Vulnerability during connection to Portal or Gateway

Urgency MODERATE

047910
Severity 5.2 · MEDIUM
Exploit Maturity UNREPORTED
Response Effort MODERATE
Recovery USER
Value Density DIFFUSE
Attack Vector ADJACENT
Attack Complexity LOW
Attack Requirements PRESENT
Automatable NO
User Interaction NONE
Product Confidentiality HIGH
Product Integrity HIGH
Product Availability HIGH
Privileges Required NONE
Subsequent Confidentiality NONE
Subsequent Integrity NONE
Subsequent Availability NONE

Description

A buffer overflow vulnerability exists in the Palo Alto Networks GlobalProtect™ app that enables a man in the middle attacker to disrupt system processes and potentially execute arbitrary code with SYSTEM privileges. This vulnerability is triggered during the processing of requests and responses exchanged between Portal and Gateway.

The GlobalProtect app on iOS is not affected.

Product Status

VersionsAffectedUnaffected
GlobalProtect AppNone on iOS
All on iOS
GlobalProtect App 6.3< 6.3.3-h9 (6.3.3-999) on Windows
< 6.3.3-h9 (6.3.3-999) on macOS
< 6.3.3-h2 (6.3.3-42) on Linux
>= 6.3.3-h9 (6.3.3-999) on Windows
>= 6.3.3-h9 (6.3.3-999) on macOS
>= 6.3.3-h2 (6.3.3-42) on Linux
GlobalProtect App 6.2< 6.2.8-h10 (6.2.8-948) on Windows
< 6.2.8-h10 (6.2.8-948) on macOS
>= 6.2.8-h10 (6.2.8-948) on Windows
>= 6.2.8-h10 (6.2.8-948) on macOS
GlobalProtect App 6.1< 6.1.13 on Android
< 6.1.13 on ChromeOS
>= 6.1.13 on Android
>= 6.1.13 on ChromeOS
GlobalProtect App 6.0< 6.0.11 on Linux
< 6.0.13 on Windows
< 6.0.13 on macOS
< 6.0.14 on Android
< 6.0.14 on ChromeOS
>= 6.0.11 on Linux (ETA: 06/04)
>= 6.0.13 on Windows
>= 6.0.13 on macOS
>= 6.0.14 on Android (ETA: 05/20)
>= 6.0.14 on ChromeOS (ETA: 05/20)
GlobalProtect UWP App 6.3< 6.3.3-h10 on Windows
>= 6.3.3-h10 on Windows (ETA: 06/04)

Required Configuration for Exposure

No special configuration is required to be affected by this issue.

Severity: MEDIUM, Suggested Urgency: MODERATE

CVSS-BT: 5.2 / CVSS-B: 7.7 (CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/AU:N/R:U/V:D/RE:M/U:Amber)

Exploitation Status

Palo Alto Networks is not aware of any malicious exploitation of this issue.

Weakness Type and Impact

CWE-787 Out-of-bounds Write

CAPEC-540 Overread Buffers

Solution

VersionMinor VersionSuggested Solution
GlobalProtect App 6.3 on Windows6.3.0 through 6.3.3-h8Upgrade to 6.3.3-h9 (6.3.3-999) or later.
GlobalProtect App 6.2 on Windows6.2.0 through 6.2.8-h9Upgrade to 6.2.8-h10 (6.2.8-948) or later.
GlobalProtect App 6.0 on Windows6.0.0 through 6.0.12Upgrade to 6.0.13 or later.
GlobalProtect App 6.0 on Linux6.0.0 through 6.0.10Upgrade to 6.0.11 or later. 
GlobalProtect App 6.2/6.3 on Linux6.2.0 through 6.3.3-h1Upgrade to 6.3.3-h2 (6.3.3-42) or later.
GlobalProtect App 6.3 on macOS6.3.0 through 6.3.3-h8Upgrade to 6.3.3-h9 (6.3.3-999) or later.
GlobalProtect App 6.2 on macOS6.2.0 through 6.2.8-h9Upgrade to 6.2.8-h10 (6.2.8-948) or later.
GlobalProtect App 6.0 on macOS6.0.0 through 6.0.12Upgrade to 6.0.13 or later.
GlobalProtect App 6.1 on Android6.1.0 through 6.1.12Upgrade to 6.1.13 or later.
GlobalProtect App 6.0 on Android6.0.0 through 6.0.13Upgrade to 6.0.14 or later.
GlobalProtect App 6.1 on ChromeOS6.1.0 through 6.1.12Upgrade to 6.1.13 or later.
GlobalProtect App 6.0 on ChromeOS6.0.0 through 6.0.13Upgrade to 6.0.14 or later.
GlobalProtect UWP App6.1.0 through 6.3.3-h9Upgrade to 6.3.3-h10 or later.
GlobalProtect App on iOS
No action needed

Workarounds and Mitigations

No known workarounds exist for this issue.

Acknowledgments

Palo Alto Networks thanks our internal security research teams for discovering and reporting this issue.

CPE Applicability

Timeline

Initial Publication.
© 2026 Palo Alto Networks, Inc. All rights reserved.