We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-4227

GlobalProtect App: Interception in Endpoint Traffic Policy Enforcement



Description

An improper access control vulnerability in the Endpoint Traffic Policy Enforcement https://docs.paloaltonetworks.com/globalprotect/6-0/globalprotect-app-new-features/new-features-released-in-gp-app/endpoint-traffic-policy-enforcement feature of the Palo Alto Networks GlobalProtect™ app allows certain packets to remain unencrypted instead of being properly secured within the tunnel. An attacker with physical access to the network can inject rogue devices to intercept these packets. Under normal operating conditions, the GlobalProtect app automatically recovers from this interception within one minute.

Reserved 2025-05-02 | Published 2025-06-13 | Updated 2025-06-13 | Assigner palo_alto


LOW: 1.0CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/AU:N/R:U/V:D/RE:L/U:Green

Problem types

CWE-319 Cleartext Transmission of Sensitive Information

Product status

Default status
unaffected

6.3.0 before 6.3.2-566
affected

6.2.0 before 6.2.8-h2
affected

6.1.0
affected

6.0.0
affected

Default status
unaffected

All before 11.2.7
unaffected

Timeline

2025-06-11:Initial Publication

Credits

Tan Cheng Ghee of OCBC Bank finder

References

security.paloaltonetworks.com/CVE-2025-4227 vendor-advisory

cve.org (CVE-2025-4227)

nvd.nist.gov (CVE-2025-4227)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-4227

Support options

Helpdesk Chat, Email, Knowledgebase