Palo Alto GlobalProtect App MacOS 6.0.x < 6.0.13 / 6.2.x < 6.2.8-h10 / 6.3.x < 6.3.3-h9 Improper Certificate Validation (CVE-2026-0249)

high Nessus Plugin ID 314670

Synopsis

A VPN client installed on remote macOS host is affected by an improper certificate validation vulnerability.

Description

The version of Palo Alto GlobalProtect App installed on the remote macOS host is 6.0.x prior to 6.0.13, 6.2.x prior to 6.2.8-h10, or 6.3.x prior to 6.3.3-h9. It is, therefore, affected by an improper certificate validation vulnerability:

- Multiple improper certificate validation vulnerabilities in the Palo Alto Networks GlobalProtect app enables an attacker to intercept encrypted communications and potentially compromise the endpoint. (CVE-2026-0249)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Palo Alto GlobalProtect App version 6.0.13, 6.2.8-h10, 6.3.3-h9 or later.

See Also

http://www.nessus.org/u?f24fc59e

Plugin Details

Severity: High

ID: 314670

File Name: palo_alto_globalprotect_agent_macos_CVE-2026-0249.nasl

Version: 1.1

Type: Local

Agent: macosx

Published: 5/14/2026

Updated: 5/14/2026

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.0

CVSS v2

Risk Factor: Medium

Base Score: 4.8

Vector: CVSS2#AV:A/AC:L/Au:N/C:P/I:P/A:N

CVSS Score Source: CVE-2026-0249

CVSS v3

Risk Factor: High

Base Score: 8.1

Vector: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Vulnerability Information

CPE: cpe:/a:paloaltonetworks:globalprotect

Required KB Items: Host/MacOSX/Version, installed_sw/Palo Alto GlobalProtect Agent

Patch Publication Date: 5/13/2026

Vulnerability Publication Date: 5/13/2026

Reference Information

CVE: CVE-2026-0249