Improper Access Control in Palo Alto Networks GlobalProtect App
CVE-2025-4227

1LOW

Key Information:

Vendor
CVE Published:
13 June 2025

Badges

👾 Exploit Exists

What is CVE-2025-4227?

An improper access control vulnerability exists in the Palo Alto Networks GlobalProtect app's Endpoint Traffic Policy Enforcement feature. This flaw may allow specific packets to bypass encryption, potentially exposing sensitive data. Attackers with physical access to the network could exploit this vulnerability by injecting rogue devices to capture these unencrypted packets. Although the GlobalProtect app can recover automatically from this situation within one minute, the risk of data interception remains a security concern.

Affected Version(s)

GlobalProtect App Windows 6.3.0 < 6.3.2-566

GlobalProtect App Windows 6.2.0 < 6.2.8-h2

GlobalProtect App Windows 6.1.0

References

CVSS V4

Score:
1
Severity:
LOW
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Physical
Attack Complexity:
Low
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
Unknown

Timeline

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

Tan Cheng Ghee of OCBC Bank
.
CVE-2025-4227 : Improper Access Control in Palo Alto Networks GlobalProtect App