Home

Description

A buffer overflow vulnerability exists in the Palo Alto Networks GlobalProtect™ app that enables a man in the middle attacker to disrupt system processes and potentially execute arbitrary code with SYSTEM privileges. This vulnerability is triggered during the processing of requests and responses exchanged between Portal and Gateway. The GlobalProtect app on iOS is not affected.

PUBLISHED Reserved 2025-11-03 | Published 2026-05-13 | Updated 2026-05-14 | Assigner palo_alto




MEDIUM: 5.2CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/AU:N/R:U/V:D/RE:M/U:Amber

Problem types

CWE-787 Out-of-bounds Write

Product status

Default status
unaffected

6.3.0 (custom) before 6.3.3-h9 (6.3.3-999)
affected

6.2.0 (custom) before 6.2.8-h10 (6.2.8-948)
affected

Default status
unaffected

6.1 (custom) before 6.1.13
affected

Default status
unaffected

6.3.0 (custom) before 6.3.3-h2 (6.3.3-42)
affected

6.0.0 (custom) before 6.0.11
affected

Default status
unaffected

6.0 (custom) before 6.0.13
affected

Default status
unaffected

6.0 (custom) before 6.0.14
affected

Default status
unaffected

6.3 (custom) before 6.3.3-h10
affected

Default status
unaffected

All (custom)
unaffected

Timeline

2026-05-13:Initial Publication.

Credits

our internal security research teams other

References

security.paloaltonetworks.com/CVE-2026-0250 vendor-advisory

cve.org (CVE-2026-0250)

nvd.nist.gov (CVE-2026-0250)

Download JSON