We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
When configured using SAML, a session fixation vulnerability in the GlobalProtect™ login enables an attacker to impersonate a legitimate authorized user and perform actions as that GlobalProtect user. This requires the legitimate user to first click on a malicious link provided by the attacker. The SAML login for the PAN-OS® management interface is not affected. Additionally, this issue does not affect Cloud NGFW and all Prisma® Access instances are proactively patched.
Reserved 2024-12-20 | Published 2025-04-11 | Updated 2025-04-11 | Assigner palo_alto2025-04-09: | Initial Publication |
D'Angelo Gonzalez of CrowdStrike
security.paloaltonetworks.com/CVE-2025-0126
Support options