Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2026-0251 (GCVE-0-2026-0251)
Vulnerability from cvelistv5 – Published: 2026-05-13 18:20 – Updated: 2026-05-14 03:56- CWE-426 - Untrusted Search Path
| URL | Tags |
|---|---|
| https://security.paloaltonetworks.com/CVE-2026-0251 | vendor-advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| Palo Alto Networks | GlobalProtect App |
Affected:
6.3.0 , < 6.3.3-h9 (6.3.3-999)
(custom)
Affected: 6.2.0 , < 6.2.8-h10 (6.2.8-948) (custom) Affected: 6.0.0 , < 6.0.13 (custom) cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.12:*:*:*:*:Windows:*:* cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.11:*:*:*:*:Windows:*:* cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.10:*:*:*:*:Windows:*:* cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.8:*:*:*:*:Windows:*:* cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.7:*:*:*:*:Windows:*:* cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.6:*:*:*:*:Windows:*:* cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.5:*:*:*:*:Windows:*:* cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.4:*:*:*:*:Windows:*:* cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.3:*:*:*:*:Windows:*:* cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.2:*:*:*:*:Windows:*:* cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.1:*:*:*:*:Windows:*:* cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.0:*:*:*:*:Windows:*:* |
|
| Palo Alto Networks | GlobalProtect App |
Affected:
6.3.0 , < 6.3.3-h9 (6.3.3-999)
(custom)
Affected: 6.2.0 , < 6.2.8-h10 (6.2.8-948) (custom) Affected: 6.0.0 , < 6.0.13 (custom) cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.12:*:*:*:*:macOS:*:* cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.11:*:*:*:*:macOS:*:* cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.10:*:*:*:*:macOS:*:* cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.8:*:*:*:*:macOS:*:* cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.7:*:*:*:*:macOS:*:* cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.6:*:*:*:*:macOS:*:* cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.5:*:*:*:*:macOS:*:* cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.4:*:*:*:*:macOS:*:* cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.3:*:*:*:*:macOS:*:* cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.2:*:*:*:*:macOS:*:* cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.1:*:*:*:*:macOS:*:* cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.0:*:*:*:*:macOS:*:* |
|
| Palo Alto Networks | GlobalProtect App |
Affected:
6.3.0 , < 6.3.3-h2 (6.3.3-42)
(custom)
Affected: 6.0.0 , < 6.0.11 (custom) cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.12:*:*:*:*:Linux:*:* cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.11:*:*:*:*:Linux:*:* cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.10:*:*:*:*:Linux:*:* cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.8:*:*:*:*:Linux:*:* cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.7:*:*:*:*:Linux:*:* cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.6:*:*:*:*:Linux:*:* cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.5:*:*:*:*:Linux:*:* cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.4:*:*:*:*:Linux:*:* cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.3:*:*:*:*:Linux:*:* cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.2:*:*:*:*:Linux:*:* cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.1:*:*:*:*:Linux:*:* cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.0:*:*:*:*:Linux:*:* |
|
| Palo Alto Networks | Global Protect App |
Unaffected:
All
(custom)
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-0251",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-05-13T00:00:00+00:00",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-05-14T03:56:34.668Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.12:*:*:*:*:Windows:*:*",
"cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.11:*:*:*:*:Windows:*:*",
"cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.10:*:*:*:*:Windows:*:*",
"cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.8:*:*:*:*:Windows:*:*",
"cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.7:*:*:*:*:Windows:*:*",
"cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.6:*:*:*:*:Windows:*:*",
"cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.5:*:*:*:*:Windows:*:*",
"cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.4:*:*:*:*:Windows:*:*",
"cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.3:*:*:*:*:Windows:*:*",
"cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.2:*:*:*:*:Windows:*:*",
"cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.1:*:*:*:*:Windows:*:*",
"cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.0:*:*:*:*:Windows:*:*"
],
"defaultStatus": "unaffected",
"platforms": [
"Windows"
],
"product": "GlobalProtect App",
"vendor": "Palo Alto Networks",
"versions": [
{
"changes": [
{
"at": "6.3.3-h9 (6.3.3-999)",
"status": "unaffected"
}
],
"lessThan": "6.3.3-h9 (6.3.3-999)",
"status": "affected",
"version": "6.3.0",
"versionType": "custom"
},
{
"changes": [
{
"at": "6.2.8-h10 (6.2.8-948)",
"status": "unaffected"
}
],
"lessThan": "6.2.8-h10 (6.2.8-948)",
"status": "affected",
"version": "6.2.0",
"versionType": "custom"
},
{
"changes": [
{
"at": "6.0.13",
"status": "unaffected"
}
],
"lessThan": "6.0.13",
"status": "affected",
"version": "6.0.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.12:*:*:*:*:macOS:*:*",
"cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.11:*:*:*:*:macOS:*:*",
"cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.10:*:*:*:*:macOS:*:*",
"cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.8:*:*:*:*:macOS:*:*",
"cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.7:*:*:*:*:macOS:*:*",
"cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.6:*:*:*:*:macOS:*:*",
"cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.5:*:*:*:*:macOS:*:*",
"cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.4:*:*:*:*:macOS:*:*",
"cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.3:*:*:*:*:macOS:*:*",
"cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.2:*:*:*:*:macOS:*:*",
"cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.1:*:*:*:*:macOS:*:*",
"cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.0:*:*:*:*:macOS:*:*"
],
"defaultStatus": "unaffected",
"platforms": [
"macOS"
],
"product": "GlobalProtect App",
"vendor": "Palo Alto Networks",
"versions": [
{
"changes": [
{
"at": "6.3.3-h9 (6.3.3-999)",
"status": "unaffected"
}
],
"lessThan": "6.3.3-h9 (6.3.3-999)",
"status": "affected",
"version": "6.3.0",
"versionType": "custom"
},
{
"changes": [
{
"at": "6.2.8-h10 (6.2.8-948)",
"status": "unaffected"
}
],
"lessThan": "6.2.8-h10 (6.2.8-948)",
"status": "affected",
"version": "6.2.0",
"versionType": "custom"
},
{
"changes": [
{
"at": "6.0.13",
"status": "unaffected"
}
],
"lessThan": "6.0.13",
"status": "affected",
"version": "6.0.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.12:*:*:*:*:Linux:*:*",
"cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.11:*:*:*:*:Linux:*:*",
"cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.10:*:*:*:*:Linux:*:*",
"cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.8:*:*:*:*:Linux:*:*",
"cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.7:*:*:*:*:Linux:*:*",
"cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.6:*:*:*:*:Linux:*:*",
"cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.5:*:*:*:*:Linux:*:*",
"cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.4:*:*:*:*:Linux:*:*",
"cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.3:*:*:*:*:Linux:*:*",
"cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.2:*:*:*:*:Linux:*:*",
"cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.1:*:*:*:*:Linux:*:*",
"cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.0:*:*:*:*:Linux:*:*"
],
"defaultStatus": "unaffected",
"platforms": [
"Linux"
],
"product": "GlobalProtect App",
"vendor": "Palo Alto Networks",
"versions": [
{
"changes": [
{
"at": "6.3.3-h2 (6.3.3-42)",
"status": "unaffected"
}
],
"lessThan": "6.3.3-h2 (6.3.3-42)",
"status": "affected",
"version": "6.3.0",
"versionType": "custom"
},
{
"changes": [
{
"at": "6.0.11",
"status": "unaffected"
}
],
"lessThan": "6.0.11",
"status": "affected",
"version": "6.0.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"platforms": [
"Android",
"ChromeOS",
"iOS",
"UWP"
],
"product": "Global Protect App",
"vendor": "Palo Alto Networks",
"versions": [
{
"status": "unaffected",
"version": "All",
"versionType": "custom"
}
]
}
],
"configurations": [
{
"lang": "eng",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eNo special configuration is required to be affected by this issue.\u003c/p\u003e"
}
],
"value": "No special configuration is required to be affected by this issue."
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:palo_alto_networks:globalprotect_app:*:*:*:*:*:Windows:*:*",
"versionEndExcluding": "6.3.3-h9_(6.3.3-999)",
"versionStartIncluding": "6.3.3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:palo_alto_networks:globalprotect_app:*:*:*:*:*:Windows:*:*",
"versionEndExcluding": "6.2.8-h10_(6.2.8-948)",
"versionStartIncluding": "6.2.8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:palo_alto_networks:globalprotect_app:*:*:*:*:*:Windows:*:*",
"versionEndExcluding": "6.0.13",
"versionStartIncluding": "6.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:palo_alto_networks:globalprotect_app:*:*:*:*:*:macOS:*:*",
"versionEndExcluding": "6.3.3-h9_(6.3.3-999)",
"versionStartIncluding": "6.3.3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:palo_alto_networks:globalprotect_app:*:*:*:*:*:macOS:*:*",
"versionEndExcluding": "6.2.8-h10_(6.2.8-948)",
"versionStartIncluding": "6.2.8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:palo_alto_networks:globalprotect_app:*:*:*:*:*:macOS:*:*",
"versionEndExcluding": "6.0.13",
"versionStartIncluding": "6.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:palo_alto_networks:globalprotect_app:*:*:*:*:*:Linux:*:*",
"versionEndExcluding": "6.3.3-h2_(6.3.3-42)",
"versionStartIncluding": "6.3.3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:palo_alto_networks:globalprotect_app:*:*:*:*:*:Linux:*:*",
"versionEndExcluding": "6.0.11",
"versionStartIncluding": "6.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "OR"
}
],
"credits": [
{
"lang": "en",
"type": "other",
"value": "Palo Alto Networks thanks our internal security research teams for discovering and reporting this issue."
}
],
"datePublic": "2026-05-13T16:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eMultiple local privilege escalation vulnerabilities in the Palo Alto Networks GlobalProtect\u2122 app allow a local user to escalate their privileges to NT AUTHORITY\\SYSTEM on Windows and root on macOS and Linux. This enables a non-administrative user to execute arbitrary commands with administrative privileges.\u003cbr\u003e\u003cbr\u003eThe GlobalProtect app on iOS, Android, Chrome OS and GlobalProtect UWP app are not affected.\u003c/p\u003e"
}
],
"value": "Multiple local privilege escalation vulnerabilities in the Palo Alto Networks GlobalProtect\u2122 app allow a local user to escalate their privileges to NT AUTHORITY\\SYSTEM on Windows and root on macOS and Linux. This enables a non-administrative user to execute arbitrary commands with administrative privileges.\n\nThe GlobalProtect app on iOS, Android, Chrome OS and GlobalProtect UWP app are not affected."
}
],
"exploits": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003ePalo Alto Networks is not aware of any malicious exploitation of these issues.\u003c/p\u003e"
}
],
"value": "Palo Alto Networks is not aware of any malicious exploitation of these issues."
}
],
"impacts": [
{
"capecId": "CAPEC-233",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-233 Privilege Escalation"
}
]
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NO",
"Recovery": "USER",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "LOCAL",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"exploitMaturity": "UNREPORTED",
"privilegesRequired": "LOW",
"providerUrgency": "AMBER",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "DIFFUSE",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/AU:N/R:U/V:D/RE:M/U:Amber",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "MODERATE"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-426",
"description": "CWE-426 Untrusted Search Path",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-05-13T18:20:01.156Z",
"orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0",
"shortName": "palo_alto"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://security.paloaltonetworks.com/CVE-2026-0251"
}
],
"solutions": [
{
"lang": "eng",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003ctable class=\"tbl\"\u003e\u003cthead\u003e\u003ctr\u003e\u003cth\u003eVersion\u003c/th\u003e\u003cth\u003eMinor Version\u003c/th\u003e\u003cth\u003eSuggested Solution\u003c/th\u003e\u003c/tr\u003e\u003c/thead\u003e\u003ctbody\u003e\u003ctr\u003e\u003ctd\u003eGlobalProtect App 6.0 on Windows\u003c/td\u003e\u003ctd\u003e6.0.0 through 6.0.12\u003c/td\u003e\u003ctd\u003eUpgrade to 6.0.13 or later.\u003c/td\u003e\u003c/tr\u003e\u003ctr\u003e\u003ctd\u003eGlobalProtect App 6.2 on Windows\u003c/td\u003e\u003ctd\u003e6.2.0 through 6.2.8-h9\u003c/td\u003e\u003ctd\u003eUpgrade to 6.2.8-h10 (6.2.8-948) or later.\u003c/td\u003e\u003c/tr\u003e\u003ctr\u003e\u003ctd\u003eGlobalProtect App 6.3 on Windows\u003c/td\u003e\u003ctd\u003e6.3.0 through 6.3.3-h8\u003c/td\u003e\u003ctd\u003eUpgrade to 6.3.3-h9 (6.3.3-999) or later.\u003c/td\u003e\u003c/tr\u003e\u003ctr\u003e\u003ctd\u003eGlobalProtect App 6.0 on macOS\u003c/td\u003e\u003ctd\u003e6.0.0 through 6.0.12\u003c/td\u003e\u003ctd\u003eUpgrade to 6.0.13 or later.\u003c/td\u003e\u003c/tr\u003e\u003ctr\u003e\u003ctd\u003eGlobalProtect App 6.2 on macOS\u003c/td\u003e\u003ctd\u003e6.2.0 through 6.2.8-h9\u003c/td\u003e\u003ctd\u003eUpgrade to 6.2.8-h10 (6.2.8-948) or later.\u003c/td\u003e\u003c/tr\u003e\u003ctr\u003e\u003ctd\u003eGlobalProtect App 6.3 on macOS\u003c/td\u003e\u003ctd\u003e6.3.0 through 6.3.3-h8\u003c/td\u003e\u003ctd\u003eUpgrade to 6.3.3-h9 (6.3.3-999) or later.\u003c/td\u003e\u003c/tr\u003e\u003ctr\u003e\u003ctd\u003eGlobalProtect App 6.0 on Linux\u003c/td\u003e\u003ctd\u003e6.0.0 through 6.0.10\u003c/td\u003e\u003ctd\u003eUpgrade to 6.0.11 or later\u003c/td\u003e\u003c/tr\u003e\u003ctr\u003e\u003ctd\u003eGlobalProtect App 6.2 on Linux\u003c/td\u003e\u003ctd\u003e6.2.0 through 6.2.9\u003c/td\u003e\u003ctd\u003eUpgrade to 6.3.3-h2 (6.3.3-42) or later.\u003c/td\u003e\u003c/tr\u003e\u003ctr\u003e\u003ctd\u003eGlobalProtect App 6.3 on Linux\u003c/td\u003e\u003ctd\u003e6.3.0 through 6.3.3-h1\u003c/td\u003e\u003ctd\u003eUpgrade to 6.3.3-h2 (6.3.3-42) or later.\u003c/td\u003e\u003c/tr\u003e\u003ctr\u003e\u003ctd\u003eGlobalProtect App on Android\u003c/td\u003e\u003ctd\u003e\u003cbr\u003e\u003c/td\u003e\u003ctd\u003eNo action needed.\u003c/td\u003e\u003c/tr\u003e\u003ctr\u003e\u003ctd\u003eGlobalProtect App on Chrome OS\u003c/td\u003e\u003ctd\u003e\u003cbr\u003e\u003c/td\u003e\u003ctd\u003eNo action needed.\u003c/td\u003e\u003c/tr\u003e\u003ctr\u003e\u003ctd\u003eGlobalProtect App on iOS\u003c/td\u003e\u003ctd\u003e\u003cbr\u003e\u003c/td\u003e\u003ctd\u003eNo action needed.\u003c/td\u003e\u003c/tr\u003e\u003ctr\u003e\u003ctd\u003eGlobalProtect App on UWP\u003c/td\u003e\u003ctd\u003e\u003cbr\u003e\u003c/td\u003e\u003ctd\u003eNo action needed.\u003c/td\u003e\u003c/tr\u003e\u003c/tbody\u003e\u003c/table\u003e"
}
],
"value": "VERSION MINOR VERSION SUGGESTED SOLUTION\nGlobalProtect App 6.0 on Windows 6.0.0 through 6.0.12 Upgrade to 6.0.13 or later.\nGlobalProtect App 6.2 on Windows 6.2.0 through 6.2.8-h9 Upgrade to 6.2.8-h10 (6.2.8-948) or later.\nGlobalProtect App 6.3 on Windows 6.3.0 through 6.3.3-h8 Upgrade to 6.3.3-h9 (6.3.3-999) or later.\nGlobalProtect App 6.0 on macOS 6.0.0 through 6.0.12 Upgrade to 6.0.13 or later.\nGlobalProtect App 6.2 on macOS 6.2.0 through 6.2.8-h9 Upgrade to 6.2.8-h10 (6.2.8-948) or later.\nGlobalProtect App 6.3 on macOS 6.3.0 through 6.3.3-h8 Upgrade to 6.3.3-h9 (6.3.3-999) or later.\nGlobalProtect App 6.0 on Linux 6.0.0 through 6.0.10 Upgrade to 6.0.11 or later\nGlobalProtect App 6.2 on Linux 6.2.0 through 6.2.9 Upgrade to 6.3.3-h2 (6.3.3-42) or later.\nGlobalProtect App 6.3 on Linux 6.3.0 through 6.3.3-h1 Upgrade to 6.3.3-h2 (6.3.3-42) or later.\nGlobalProtect App on Android No action needed.\nGlobalProtect App on Chrome OS No action needed.\nGlobalProtect App on iOS No action needed.\nGlobalProtect App on UWP No action needed."
}
],
"source": {
"discovery": "INTERNAL"
},
"timeline": [
{
"lang": "en",
"time": "2026-05-13T16:00:00.000Z",
"value": "Initial publication."
}
],
"title": "GlobalProtect App: Local Privilege Escalation Vulnerabilities",
"workarounds": [
{
"lang": "eng",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eNo known workarounds exist for this issue.\u003c/p\u003e"
}
],
"value": "No known workarounds exist for this issue."
}
],
"x_affectedList": [
"GlobalProtect App 6.0.12",
"GlobalProtect App 6.0.11",
"GlobalProtect App 6.0.10",
"GlobalProtect App 6.0.8",
"GlobalProtect App 6.0.7",
"GlobalProtect App 6.0.6",
"GlobalProtect App 6.0.5",
"GlobalProtect App 6.0.4",
"GlobalProtect App 6.0.3",
"GlobalProtect App 6.0.2",
"GlobalProtect App 6.0.1",
"GlobalProtect App 6.0.0",
"GlobalProtect App 6.0"
],
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0",
"assignerShortName": "palo_alto",
"cveId": "CVE-2026-0251",
"datePublished": "2026-05-13T18:20:01.156Z",
"dateReserved": "2025-11-03T20:44:11.930Z",
"dateUpdated": "2026-05-14T03:56:34.668Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2026-0251",
"date": "2026-05-24",
"epss": "7e-05",
"percentile": "0.00498"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2026-0251\",\"sourceIdentifier\":\"psirt@paloaltonetworks.com\",\"published\":\"2026-05-13T19:16:59.470\",\"lastModified\":\"2026-05-14T16:21:23.190\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple local privilege escalation vulnerabilities in the Palo Alto Networks GlobalProtect\u2122 app allow a local user to escalate their privileges to NT AUTHORITY\\\\SYSTEM on Windows and root on macOS and Linux. This enables a non-administrative user to execute arbitrary commands with administrative privileges.\\n\\nThe GlobalProtect app on iOS, Android, Chrome OS and GlobalProtect UWP app are not affected.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"psirt@paloaltonetworks.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:U/V:D/RE:M/U:Amber\",\"baseScore\":5.9,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"attackRequirements\":\"NONE\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"vulnConfidentialityImpact\":\"HIGH\",\"vulnIntegrityImpact\":\"HIGH\",\"vulnAvailabilityImpact\":\"HIGH\",\"subConfidentialityImpact\":\"NONE\",\"subIntegrityImpact\":\"NONE\",\"subAvailabilityImpact\":\"NONE\",\"exploitMaturity\":\"UNREPORTED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NO\",\"Recovery\":\"USER\",\"valueDensity\":\"DIFFUSE\",\"vulnerabilityResponseEffort\":\"MODERATE\",\"providerUrgency\":\"AMBER\"}}]},\"weaknesses\":[{\"source\":\"psirt@paloaltonetworks.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-426\"}]}],\"references\":[{\"url\":\"https://security.paloaltonetworks.com/CVE-2026-0251\",\"source\":\"psirt@paloaltonetworks.com\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-0251\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-05-13T18:55:51.583388Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-05-13T18:55:58.045Z\"}}], \"cna\": {\"title\": \"GlobalProtect App: Local Privilege Escalation Vulnerabilities\", \"source\": {\"discovery\": \"INTERNAL\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"other\", \"value\": \"Palo Alto Networks thanks our internal security research teams for discovering and reporting this issue.\"}], \"impacts\": [{\"capecId\": \"CAPEC-233\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-233 Privilege Escalation\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV4_0\": {\"Safety\": \"NOT_DEFINED\", \"version\": \"4.0\", \"Recovery\": \"USER\", \"baseScore\": 5.9, \"Automatable\": \"NO\", \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"valueDensity\": \"DIFFUSE\", \"vectorString\": \"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/AU:N/R:U/V:D/RE:M/U:Amber\", \"exploitMaturity\": \"UNREPORTED\", \"providerUrgency\": \"AMBER\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"attackRequirements\": \"NONE\", \"privilegesRequired\": \"LOW\", \"subIntegrityImpact\": \"NONE\", \"vulnIntegrityImpact\": \"HIGH\", \"subAvailabilityImpact\": \"NONE\", \"vulnAvailabilityImpact\": \"HIGH\", \"subConfidentialityImpact\": \"NONE\", \"vulnConfidentialityImpact\": \"HIGH\", \"vulnerabilityResponseEffort\": \"MODERATE\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.12:*:*:*:*:Windows:*:*\", \"cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.11:*:*:*:*:Windows:*:*\", \"cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.10:*:*:*:*:Windows:*:*\", \"cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.8:*:*:*:*:Windows:*:*\", \"cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.7:*:*:*:*:Windows:*:*\", \"cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.6:*:*:*:*:Windows:*:*\", \"cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.5:*:*:*:*:Windows:*:*\", \"cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.4:*:*:*:*:Windows:*:*\", \"cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.3:*:*:*:*:Windows:*:*\", \"cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.2:*:*:*:*:Windows:*:*\", \"cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.1:*:*:*:*:Windows:*:*\", \"cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.0:*:*:*:*:Windows:*:*\"], \"vendor\": \"Palo Alto Networks\", \"product\": \"GlobalProtect App\", \"versions\": [{\"status\": \"affected\", \"changes\": [{\"at\": \"6.3.3-h9 (6.3.3-999)\", \"status\": \"unaffected\"}], \"version\": \"6.3.0\", \"lessThan\": \"6.3.3-h9 (6.3.3-999)\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"changes\": [{\"at\": \"6.2.8-h10 (6.2.8-948)\", \"status\": \"unaffected\"}], \"version\": \"6.2.0\", \"lessThan\": \"6.2.8-h10 (6.2.8-948)\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"changes\": [{\"at\": \"6.0.13\", \"status\": \"unaffected\"}], \"version\": \"6.0.0\", \"lessThan\": \"6.0.13\", \"versionType\": \"custom\"}], \"platforms\": [\"Windows\"], \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.12:*:*:*:*:macOS:*:*\", \"cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.11:*:*:*:*:macOS:*:*\", \"cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.10:*:*:*:*:macOS:*:*\", \"cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.8:*:*:*:*:macOS:*:*\", \"cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.7:*:*:*:*:macOS:*:*\", \"cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.6:*:*:*:*:macOS:*:*\", \"cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.5:*:*:*:*:macOS:*:*\", \"cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.4:*:*:*:*:macOS:*:*\", \"cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.3:*:*:*:*:macOS:*:*\", \"cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.2:*:*:*:*:macOS:*:*\", \"cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.1:*:*:*:*:macOS:*:*\", \"cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.0:*:*:*:*:macOS:*:*\"], \"vendor\": \"Palo Alto Networks\", \"product\": \"GlobalProtect App\", \"versions\": [{\"status\": \"affected\", \"changes\": [{\"at\": \"6.3.3-h9 (6.3.3-999)\", \"status\": \"unaffected\"}], \"version\": \"6.3.0\", \"lessThan\": \"6.3.3-h9 (6.3.3-999)\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"changes\": [{\"at\": \"6.2.8-h10 (6.2.8-948)\", \"status\": \"unaffected\"}], \"version\": \"6.2.0\", \"lessThan\": \"6.2.8-h10 (6.2.8-948)\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"changes\": [{\"at\": \"6.0.13\", \"status\": \"unaffected\"}], \"version\": \"6.0.0\", \"lessThan\": \"6.0.13\", \"versionType\": \"custom\"}], \"platforms\": [\"macOS\"], \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.12:*:*:*:*:Linux:*:*\", \"cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.11:*:*:*:*:Linux:*:*\", \"cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.10:*:*:*:*:Linux:*:*\", \"cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.8:*:*:*:*:Linux:*:*\", \"cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.7:*:*:*:*:Linux:*:*\", \"cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.6:*:*:*:*:Linux:*:*\", \"cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.5:*:*:*:*:Linux:*:*\", \"cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.4:*:*:*:*:Linux:*:*\", \"cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.3:*:*:*:*:Linux:*:*\", \"cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.2:*:*:*:*:Linux:*:*\", \"cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.1:*:*:*:*:Linux:*:*\", \"cpe:2.3:a:palo_alto_networks:globalprotect_app:6.0.0:*:*:*:*:Linux:*:*\"], \"vendor\": \"Palo Alto Networks\", \"product\": \"GlobalProtect App\", \"versions\": [{\"status\": \"affected\", \"changes\": [{\"at\": \"6.3.3-h2 (6.3.3-42)\", \"status\": \"unaffected\"}], \"version\": \"6.3.0\", \"lessThan\": \"6.3.3-h2 (6.3.3-42)\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"changes\": [{\"at\": \"6.0.11\", \"status\": \"unaffected\"}], \"version\": \"6.0.0\", \"lessThan\": \"6.0.11\", \"versionType\": \"custom\"}], \"platforms\": [\"Linux\"], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Palo Alto Networks\", \"product\": \"Global Protect App\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"All\", \"versionType\": \"custom\"}], \"platforms\": [\"Android\", \"ChromeOS\", \"iOS\", \"UWP\"], \"defaultStatus\": \"unaffected\"}], \"exploits\": [{\"lang\": \"en\", \"value\": \"Palo Alto Networks is not aware of any malicious exploitation of these issues.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003ePalo Alto Networks is not aware of any malicious exploitation of these issues.\u003c/p\u003e\", \"base64\": false}]}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2026-05-13T16:00:00.000Z\", \"value\": \"Initial publication.\"}], \"solutions\": [{\"lang\": \"eng\", \"value\": \"VERSION MINOR VERSION SUGGESTED SOLUTION\\nGlobalProtect App 6.0 on Windows 6.0.0 through 6.0.12 Upgrade to 6.0.13 or later.\\nGlobalProtect App 6.2 on Windows 6.2.0 through 6.2.8-h9 Upgrade to 6.2.8-h10 (6.2.8-948) or later.\\nGlobalProtect App 6.3 on Windows 6.3.0 through 6.3.3-h8 Upgrade to 6.3.3-h9 (6.3.3-999) or later.\\nGlobalProtect App 6.0 on macOS 6.0.0 through 6.0.12 Upgrade to 6.0.13 or later.\\nGlobalProtect App 6.2 on macOS 6.2.0 through 6.2.8-h9 Upgrade to 6.2.8-h10 (6.2.8-948) or later.\\nGlobalProtect App 6.3 on macOS 6.3.0 through 6.3.3-h8 Upgrade to 6.3.3-h9 (6.3.3-999) or later.\\nGlobalProtect App 6.0 on Linux 6.0.0 through 6.0.10 Upgrade to 6.0.11 or later\\nGlobalProtect App 6.2 on Linux 6.2.0 through 6.2.9 Upgrade to 6.3.3-h2 (6.3.3-42) or later.\\nGlobalProtect App 6.3 on Linux 6.3.0 through 6.3.3-h1 Upgrade to 6.3.3-h2 (6.3.3-42) or later.\\nGlobalProtect App on Android No action needed.\\nGlobalProtect App on Chrome OS No action needed.\\nGlobalProtect App on iOS No action needed.\\nGlobalProtect App on UWP No action needed.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003ctable class=\\\"tbl\\\"\u003e\u003cthead\u003e\u003ctr\u003e\u003cth\u003eVersion\u003c/th\u003e\u003cth\u003eMinor Version\u003c/th\u003e\u003cth\u003eSuggested Solution\u003c/th\u003e\u003c/tr\u003e\u003c/thead\u003e\u003ctbody\u003e\u003ctr\u003e\u003ctd\u003eGlobalProtect App 6.0 on Windows\u003c/td\u003e\u003ctd\u003e6.0.0 through 6.0.12\u003c/td\u003e\u003ctd\u003eUpgrade to 6.0.13 or later.\u003c/td\u003e\u003c/tr\u003e\u003ctr\u003e\u003ctd\u003eGlobalProtect App 6.2 on Windows\u003c/td\u003e\u003ctd\u003e6.2.0 through 6.2.8-h9\u003c/td\u003e\u003ctd\u003eUpgrade to 6.2.8-h10 (6.2.8-948) or later.\u003c/td\u003e\u003c/tr\u003e\u003ctr\u003e\u003ctd\u003eGlobalProtect App 6.3 on Windows\u003c/td\u003e\u003ctd\u003e6.3.0 through 6.3.3-h8\u003c/td\u003e\u003ctd\u003eUpgrade to 6.3.3-h9 (6.3.3-999) or later.\u003c/td\u003e\u003c/tr\u003e\u003ctr\u003e\u003ctd\u003eGlobalProtect App 6.0 on macOS\u003c/td\u003e\u003ctd\u003e6.0.0 through 6.0.12\u003c/td\u003e\u003ctd\u003eUpgrade to 6.0.13 or later.\u003c/td\u003e\u003c/tr\u003e\u003ctr\u003e\u003ctd\u003eGlobalProtect App 6.2 on macOS\u003c/td\u003e\u003ctd\u003e6.2.0 through 6.2.8-h9\u003c/td\u003e\u003ctd\u003eUpgrade to 6.2.8-h10 (6.2.8-948) or later.\u003c/td\u003e\u003c/tr\u003e\u003ctr\u003e\u003ctd\u003eGlobalProtect App 6.3 on macOS\u003c/td\u003e\u003ctd\u003e6.3.0 through 6.3.3-h8\u003c/td\u003e\u003ctd\u003eUpgrade to 6.3.3-h9 (6.3.3-999) or later.\u003c/td\u003e\u003c/tr\u003e\u003ctr\u003e\u003ctd\u003eGlobalProtect App 6.0 on Linux\u003c/td\u003e\u003ctd\u003e6.0.0 through 6.0.10\u003c/td\u003e\u003ctd\u003eUpgrade to 6.0.11 or later\u003c/td\u003e\u003c/tr\u003e\u003ctr\u003e\u003ctd\u003eGlobalProtect App 6.2 on Linux\u003c/td\u003e\u003ctd\u003e6.2.0 through 6.2.9\u003c/td\u003e\u003ctd\u003eUpgrade to 6.3.3-h2 (6.3.3-42) or later.\u003c/td\u003e\u003c/tr\u003e\u003ctr\u003e\u003ctd\u003eGlobalProtect App 6.3 on Linux\u003c/td\u003e\u003ctd\u003e6.3.0 through 6.3.3-h1\u003c/td\u003e\u003ctd\u003eUpgrade to 6.3.3-h2 (6.3.3-42) or later.\u003c/td\u003e\u003c/tr\u003e\u003ctr\u003e\u003ctd\u003eGlobalProtect App on Android\u003c/td\u003e\u003ctd\u003e\u003cbr\u003e\u003c/td\u003e\u003ctd\u003eNo action needed.\u003c/td\u003e\u003c/tr\u003e\u003ctr\u003e\u003ctd\u003eGlobalProtect App on Chrome OS\u003c/td\u003e\u003ctd\u003e\u003cbr\u003e\u003c/td\u003e\u003ctd\u003eNo action needed.\u003c/td\u003e\u003c/tr\u003e\u003ctr\u003e\u003ctd\u003eGlobalProtect App on iOS\u003c/td\u003e\u003ctd\u003e\u003cbr\u003e\u003c/td\u003e\u003ctd\u003eNo action needed.\u003c/td\u003e\u003c/tr\u003e\u003ctr\u003e\u003ctd\u003eGlobalProtect App on UWP\u003c/td\u003e\u003ctd\u003e\u003cbr\u003e\u003c/td\u003e\u003ctd\u003eNo action needed.\u003c/td\u003e\u003c/tr\u003e\u003c/tbody\u003e\u003c/table\u003e\", \"base64\": false}]}], \"datePublic\": \"2026-05-13T16:00:00.000Z\", \"references\": [{\"url\": \"https://security.paloaltonetworks.com/CVE-2026-0251\", \"tags\": [\"vendor-advisory\"]}], \"workarounds\": [{\"lang\": \"eng\", \"value\": \"No known workarounds exist for this issue.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003eNo known workarounds exist for this issue.\u003c/p\u003e\", \"base64\": false}]}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Multiple local privilege escalation vulnerabilities in the Palo Alto Networks GlobalProtect\\u2122 app allow a local user to escalate their privileges to NT AUTHORITY\\\\SYSTEM on Windows and root on macOS and Linux. This enables a non-administrative user to execute arbitrary commands with administrative privileges.\\n\\nThe GlobalProtect app on iOS, Android, Chrome OS and GlobalProtect UWP app are not affected.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003eMultiple local privilege escalation vulnerabilities in the Palo Alto Networks GlobalProtect\\u2122 app allow a local user to escalate their privileges to NT AUTHORITY\\\\SYSTEM on Windows and root on macOS and Linux. This enables a non-administrative user to execute arbitrary commands with administrative privileges.\u003cbr\u003e\u003cbr\u003eThe GlobalProtect app on iOS, Android, Chrome OS and GlobalProtect UWP app are not affected.\u003c/p\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-426\", \"description\": \"CWE-426 Untrusted Search Path\"}]}], \"configurations\": [{\"lang\": \"eng\", \"value\": \"No special configuration is required to be affected by this issue.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003eNo special configuration is required to be affected by this issue.\u003c/p\u003e\", \"base64\": false}]}], \"x_affectedList\": [\"GlobalProtect App 6.0.12\", \"GlobalProtect App 6.0.11\", \"GlobalProtect App 6.0.10\", \"GlobalProtect App 6.0.8\", \"GlobalProtect App 6.0.7\", \"GlobalProtect App 6.0.6\", \"GlobalProtect App 6.0.5\", \"GlobalProtect App 6.0.4\", \"GlobalProtect App 6.0.3\", \"GlobalProtect App 6.0.2\", \"GlobalProtect App 6.0.1\", \"GlobalProtect App 6.0.0\", \"GlobalProtect App 6.0\"], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:a:palo_alto_networks:globalprotect_app:*:*:*:*:*:Windows:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.3.3-h9_(6.3.3-999)\", \"versionStartIncluding\": \"6.3.3\"}, {\"criteria\": \"cpe:2.3:a:palo_alto_networks:globalprotect_app:*:*:*:*:*:Windows:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.2.8-h10_(6.2.8-948)\", \"versionStartIncluding\": \"6.2.8\"}, {\"criteria\": \"cpe:2.3:a:palo_alto_networks:globalprotect_app:*:*:*:*:*:Windows:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.0.13\", \"versionStartIncluding\": \"6.0.0\"}], \"operator\": \"OR\"}, {\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:a:palo_alto_networks:globalprotect_app:*:*:*:*:*:macOS:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.3.3-h9_(6.3.3-999)\", \"versionStartIncluding\": \"6.3.3\"}, {\"criteria\": \"cpe:2.3:a:palo_alto_networks:globalprotect_app:*:*:*:*:*:macOS:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.2.8-h10_(6.2.8-948)\", \"versionStartIncluding\": \"6.2.8\"}, {\"criteria\": \"cpe:2.3:a:palo_alto_networks:globalprotect_app:*:*:*:*:*:macOS:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.0.13\", \"versionStartIncluding\": \"6.0.0\"}], \"operator\": \"OR\"}, {\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:a:palo_alto_networks:globalprotect_app:*:*:*:*:*:Linux:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.3.3-h2_(6.3.3-42)\", \"versionStartIncluding\": \"6.3.3\"}, {\"criteria\": \"cpe:2.3:a:palo_alto_networks:globalprotect_app:*:*:*:*:*:Linux:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.0.11\", \"versionStartIncluding\": \"6.0.0\"}], \"operator\": \"OR\"}], \"operator\": \"OR\"}], \"providerMetadata\": {\"orgId\": \"d6c1279f-00f6-4ef7-9217-f89ffe703ec0\", \"shortName\": \"palo_alto\", \"dateUpdated\": \"2026-05-13T18:20:01.156Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2026-0251\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-05-14T03:56:34.668Z\", \"dateReserved\": \"2025-11-03T20:44:11.930Z\", \"assignerOrgId\": \"d6c1279f-00f6-4ef7-9217-f89ffe703ec0\", \"datePublished\": \"2026-05-13T18:20:01.156Z\", \"assignerShortName\": \"palo_alto\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
CERTFR-2026-AVI-0596
Vulnerability from certfr_avis - Published: 2026-05-15 - Updated: 2026-05-15
De multiples vulnérabilités ont été découvertes dans les produits Palo Alto Networks. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
L'éditeur indique que des correctifs seront publiés le 28 mai 2026.
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Palo Alto Networks | N/A | WildFire WF-500 et WF-500-B versions 12.1.4 antérieures à 12.1.4-h5 | ||
| Palo Alto Networks | GlobalProtect App | GlobalProtect App versions 6.0.x antérieures à 6.0.14 pour Android et ChromeOS | ||
| Palo Alto Networks | Prisma Access Browser | Prisma Access versions 10.2.x antérieures à 10.2.10-h36 | ||
| Palo Alto Networks | PAN-OS | PAN-OS versions 11.2.12 | ||
| Palo Alto Networks | N/A | Prisma SD-WAN ION versions 6.3.x antérieures à 6.3.6-b10 | ||
| Palo Alto Networks | N/A | WildFire WF-500 et WF-500-B versions 11.1.13 antérieures à 11.1.13-h5 | ||
| Palo Alto Networks | GlobalProtect App | GlobalProtect App versions 6.0.x antérieures à 6.0.11 pour Linux | ||
| Palo Alto Networks | N/A | WildFire WF-500 et WF-500-B versions 11.2.10 antérieures à 11.2.10-h6 | ||
| Palo Alto Networks | GlobalProtect App | GlobalProtect App versions 6.1.x antérieures à 6.1.13 pour Android et ChomeOS | ||
| Palo Alto Networks | PAN-OS | PAN-OS versions 11.2.7 antérieures à 11.2.7-h14 | ||
| Palo Alto Networks | Prisma Access Browser | Prisma Access Agent versions 25.x et 26.x antérieures à 26.2.1 pour Android et ChromeOS | ||
| Palo Alto Networks | N/A | WildFire WF-500 et WF-500-B versions 10.2.7 antérieures à 10.2.7-h34 | ||
| Palo Alto Networks | PAN-OS | PAN-OS versions 11.2.4 antérieures à 11.2.4-h17 | ||
| Palo Alto Networks | N/A | WildFire WF-500 et WF-500-B versions 11.1.6 antérieures à 11.1.6-h32 | ||
| Palo Alto Networks | N/A | Prisma SD-WAN ION versions 6.5.x antérieures à 6.5.3-b15 | ||
| Palo Alto Networks | N/A | WildFire WF-500 et WF-500-B versions 10.2.13 antérieures à 10.2.13-h21 | ||
| Palo Alto Networks | PAN-OS | PAN-OS versions 11.1.15 | ||
| Palo Alto Networks | N/A | Prisma SD-WAN ION versions 6.4.x antérieures à 6.4.3-b8 | ||
| Palo Alto Networks | PAN-OS | PAN-OS versions 10.2.7 antérieures à 10.2.7-h34 | ||
| Palo Alto Networks | N/A | Chronosphere Chronocollector versions antérieures à v0.116.0 | ||
| Palo Alto Networks | PAN-OS | PAN-OS versions 12.1.7 | ||
| Palo Alto Networks | N/A | Broker VM versions 30.0.x antérieures à 30.0.24 | ||
| Palo Alto Networks | N/A | WildFire WF-500 et WF-500-B versions 11.1.7 antérieures à 11.1.7-h6 | ||
| Palo Alto Networks | N/A | WildFire WF-500 et WF-500-B versions 11.1.10 antérieures à 11.1.10-h25 | ||
| Palo Alto Networks | N/A | Trust Protection Foundation versions 24.1.x antérieures à 24.1.13 | ||
| Palo Alto Networks | PAN-OS | PAN-OS versions 11.1.10 antérieures à 11.1.10-h25 | ||
| Palo Alto Networks | N/A | WildFire WF-500 et WF-500-B versions 11.2.12 | ||
| Palo Alto Networks | PAN-OS | PAN-OS versions 11.2.10 antérieures à 11.2.10-h7 | ||
| Palo Alto Networks | GlobalProtect App | GlobalProtect App versions 6.0.x antérieures à 6.0.13 pour macOS et Windows | ||
| Palo Alto Networks | PAN-OS | PAN-OS versions 10.2.16 antérieures à 10.2.16-h7 | ||
| Palo Alto Networks | PAN-OS | PAN-OS versions 11.1.7 antérieures à 11.1.7-h6 | ||
| Palo Alto Networks | PAN-OS | PAN-OS versions 12.1.4 antérieures à 12.1.4-h5 | ||
| Palo Alto Networks | Prisma Access Browser | Prisma Browser versions antérieures à 148.6.3.96 | ||
| Palo Alto Networks | N/A | Trust Protection Foundation versions 24.3.x antérieures à 24.3.6 | ||
| Palo Alto Networks | N/A | WildFire WF-500 et WF-500-B versions 11.1.4 antérieures à 11.1.4-h33 | ||
| Palo Alto Networks | PAN-OS | PAN-OS versions 11.1.4 antérieures à 11.1.4-h33 | ||
| Palo Alto Networks | N/A | WildFire WF-500 et WF-500-B versions 10.2.10 antérieures à 10.2.10-h36 | ||
| Palo Alto Networks | N/A | WildFire WF-500 et WF-500-B versions 10.2.18 antérieures à 10.2.18-h6 | ||
| Palo Alto Networks | N/A | Trust Protection Foundation versions 25.3.x antérieures à 25.3.3 | ||
| Palo Alto Networks | PAN-OS | PAN-OS versions 12.1.4 antérieures à 12.1.4-h6 | ||
| Palo Alto Networks | PAN-OS | PAN-OS versions 11.2.10 antérieures à 11.2.10-h6 | ||
| Palo Alto Networks | Prisma Access Browser | Prisma Access Agent (Endpoint DLP) versions 25.x à 26.x antérieures à 26.2.1 pour Windows et macOS | ||
| Palo Alto Networks | PAN-OS | PAN-OS versions 10.2.18 antérieures à 10.2.18-h6 | ||
| Palo Alto Networks | Prisma Access Browser | Prisma Access versions 11.2.x antérieures à 11.2.7-h13 | ||
| Palo Alto Networks | N/A | WildFire WF-500 et WF-500-B versions 10.2.16 antérieures à 10.2.16-h7 | ||
| Palo Alto Networks | GlobalProtect App | GlobalProtect App versions 6.3.x antérieures à 6.3.3-h2 pour Linux | ||
| Palo Alto Networks | N/A | GlobalProtect UWP App versions 6.3 antérieures à 6.3.3-h10 | ||
| Palo Alto Networks | N/A | WildFire WF-500 et WF-500-B versions 11.1.15 | ||
| Palo Alto Networks | GlobalProtect App | GlobalProtect App versions 6.3.x antérieures à 6.3.3-h10 pour Windows et macOS | ||
| Palo Alto Networks | N/A | WildFire WF-500 et WF-500-B versions 11.2.7 antérieures à 11.2.7-h13 | ||
| Palo Alto Networks | GlobalProtect App | GlobalProtect App versions 6.2.x antérieures à 6.2.8-h10 (6.2.8-948) | ||
| Palo Alto Networks | N/A | WildFire WF-500 et WF-500-B versions 11.2.4 antérieures à 11.2.4-h17 | ||
| Palo Alto Networks | PAN-OS | PAN-OS versions 11.1.6 antérieures à 11.1.6-h32 | ||
| Palo Alto Networks | PAN-OS | PAN-OS versions 11.1.13 antérieures à 11.1.13-h5 | ||
| Palo Alto Networks | PAN-OS | PAN-OS versions 10.2.10 antérieures à 10.2.10-h36 | ||
| Palo Alto Networks | PAN-OS | PAN-OS versions 11.2.7 antérieures à 11.2.7-h13 | ||
| Palo Alto Networks | N/A | WildFire WF-500 et WF-500-B versions 12.1.7 | ||
| Palo Alto Networks | N/A | Trust Protection Foundation versions 25.1.x antérieures à 25.1.8 | ||
| Palo Alto Networks | PAN-OS | PAN-OS versions 10.2.13 antérieures à 10.2.13-h21 |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "WildFire WF-500 et WF-500-B versions 12.1.4 ant\u00e9rieures \u00e0 12.1.4-h5",
"product": {
"name": "N/A",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "GlobalProtect App versions 6.0.x ant\u00e9rieures \u00e0 6.0.14 pour Android et ChromeOS",
"product": {
"name": "GlobalProtect App",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "Prisma Access versions 10.2.x ant\u00e9rieures \u00e0 10.2.10-h36",
"product": {
"name": "Prisma Access Browser",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "PAN-OS versions 11.2.12",
"product": {
"name": "PAN-OS",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "Prisma SD-WAN ION versions 6.3.x ant\u00e9rieures \u00e0 6.3.6-b10",
"product": {
"name": "N/A",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "WildFire WF-500 et WF-500-B versions 11.1.13 ant\u00e9rieures \u00e0 11.1.13-h5",
"product": {
"name": "N/A",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "GlobalProtect App versions 6.0.x ant\u00e9rieures \u00e0 6.0.11 pour Linux",
"product": {
"name": "GlobalProtect App",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "WildFire WF-500 et WF-500-B versions 11.2.10 ant\u00e9rieures \u00e0 11.2.10-h6",
"product": {
"name": "N/A",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "GlobalProtect App versions 6.1.x ant\u00e9rieures \u00e0 6.1.13 pour Android et ChomeOS",
"product": {
"name": "GlobalProtect App",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "PAN-OS versions 11.2.7 ant\u00e9rieures \u00e0 11.2.7-h14",
"product": {
"name": "PAN-OS",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "Prisma Access Agent versions 25.x et 26.x ant\u00e9rieures \u00e0 26.2.1 pour Android et ChromeOS",
"product": {
"name": "Prisma Access Browser",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "WildFire WF-500 et WF-500-B versions 10.2.7 ant\u00e9rieures \u00e0 10.2.7-h34",
"product": {
"name": "N/A",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "PAN-OS versions 11.2.4 ant\u00e9rieures \u00e0 11.2.4-h17",
"product": {
"name": "PAN-OS",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "WildFire WF-500 et WF-500-B versions 11.1.6 ant\u00e9rieures \u00e0 11.1.6-h32",
"product": {
"name": "N/A",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "Prisma SD-WAN ION versions 6.5.x ant\u00e9rieures \u00e0 6.5.3-b15",
"product": {
"name": "N/A",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "WildFire WF-500 et WF-500-B versions 10.2.13 ant\u00e9rieures \u00e0 10.2.13-h21",
"product": {
"name": "N/A",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "PAN-OS versions 11.1.15",
"product": {
"name": "PAN-OS",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "Prisma SD-WAN ION versions 6.4.x ant\u00e9rieures \u00e0 6.4.3-b8",
"product": {
"name": "N/A",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "PAN-OS versions 10.2.7 ant\u00e9rieures \u00e0 10.2.7-h34",
"product": {
"name": "PAN-OS",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "Chronosphere Chronocollector versions ant\u00e9rieures \u00e0 v0.116.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "PAN-OS versions 12.1.7",
"product": {
"name": "PAN-OS",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "Broker VM versions 30.0.x ant\u00e9rieures \u00e0 30.0.24",
"product": {
"name": "N/A",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "WildFire WF-500 et WF-500-B versions 11.1.7 ant\u00e9rieures \u00e0 11.1.7-h6",
"product": {
"name": "N/A",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "WildFire WF-500 et WF-500-B versions 11.1.10 ant\u00e9rieures \u00e0 11.1.10-h25",
"product": {
"name": "N/A",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "Trust Protection Foundation versions 24.1.x ant\u00e9rieures \u00e0 24.1.13",
"product": {
"name": "N/A",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "PAN-OS versions 11.1.10 ant\u00e9rieures \u00e0 11.1.10-h25",
"product": {
"name": "PAN-OS",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "WildFire WF-500 et WF-500-B versions 11.2.12",
"product": {
"name": "N/A",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "PAN-OS versions 11.2.10 ant\u00e9rieures \u00e0 11.2.10-h7",
"product": {
"name": "PAN-OS",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "GlobalProtect App versions 6.0.x ant\u00e9rieures \u00e0 6.0.13 pour macOS et Windows",
"product": {
"name": "GlobalProtect App",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "PAN-OS versions 10.2.16 ant\u00e9rieures \u00e0 10.2.16-h7",
"product": {
"name": "PAN-OS",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "PAN-OS versions 11.1.7 ant\u00e9rieures \u00e0 11.1.7-h6",
"product": {
"name": "PAN-OS",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "PAN-OS versions 12.1.4 ant\u00e9rieures \u00e0 12.1.4-h5",
"product": {
"name": "PAN-OS",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "Prisma Browser versions ant\u00e9rieures \u00e0 148.6.3.96",
"product": {
"name": "Prisma Access Browser",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "Trust Protection Foundation versions 24.3.x ant\u00e9rieures \u00e0 24.3.6",
"product": {
"name": "N/A",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "WildFire WF-500 et WF-500-B versions 11.1.4 ant\u00e9rieures \u00e0 11.1.4-h33",
"product": {
"name": "N/A",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "PAN-OS versions 11.1.4 ant\u00e9rieures \u00e0 11.1.4-h33",
"product": {
"name": "PAN-OS",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "WildFire WF-500 et WF-500-B versions 10.2.10 ant\u00e9rieures \u00e0 10.2.10-h36",
"product": {
"name": "N/A",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "WildFire WF-500 et WF-500-B versions 10.2.18 ant\u00e9rieures \u00e0 10.2.18-h6",
"product": {
"name": "N/A",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "Trust Protection Foundation versions 25.3.x ant\u00e9rieures \u00e0 25.3.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "PAN-OS versions 12.1.4 ant\u00e9rieures \u00e0 12.1.4-h6",
"product": {
"name": "PAN-OS",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "PAN-OS versions 11.2.10 ant\u00e9rieures \u00e0 11.2.10-h6",
"product": {
"name": "PAN-OS",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "Prisma Access Agent (Endpoint DLP) versions 25.x \u00e0 26.x ant\u00e9rieures \u00e0 26.2.1 pour Windows et macOS",
"product": {
"name": "Prisma Access Browser",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "PAN-OS versions 10.2.18 ant\u00e9rieures \u00e0 10.2.18-h6",
"product": {
"name": "PAN-OS",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "Prisma Access versions 11.2.x ant\u00e9rieures \u00e0 11.2.7-h13",
"product": {
"name": "Prisma Access Browser",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "WildFire WF-500 et WF-500-B versions 10.2.16 ant\u00e9rieures \u00e0 10.2.16-h7",
"product": {
"name": "N/A",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "GlobalProtect App versions 6.3.x ant\u00e9rieures \u00e0 6.3.3-h2 pour Linux",
"product": {
"name": "GlobalProtect App",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "GlobalProtect UWP App versions 6.3 ant\u00e9rieures \u00e0 6.3.3-h10",
"product": {
"name": "N/A",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "WildFire WF-500 et WF-500-B versions 11.1.15",
"product": {
"name": "N/A",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "GlobalProtect App versions 6.3.x ant\u00e9rieures \u00e0 6.3.3-h10 pour Windows et macOS",
"product": {
"name": "GlobalProtect App",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "WildFire WF-500 et WF-500-B versions 11.2.7 ant\u00e9rieures \u00e0 11.2.7-h13",
"product": {
"name": "N/A",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "GlobalProtect App versions 6.2.x ant\u00e9rieures \u00e0 6.2.8-h10 (6.2.8-948)",
"product": {
"name": "GlobalProtect App",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "WildFire WF-500 et WF-500-B versions 11.2.4 ant\u00e9rieures \u00e0 11.2.4-h17",
"product": {
"name": "N/A",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "PAN-OS versions 11.1.6 ant\u00e9rieures \u00e0 11.1.6-h32",
"product": {
"name": "PAN-OS",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "PAN-OS versions 11.1.13 ant\u00e9rieures \u00e0 11.1.13-h5",
"product": {
"name": "PAN-OS",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "PAN-OS versions 10.2.10 ant\u00e9rieures \u00e0 10.2.10-h36",
"product": {
"name": "PAN-OS",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "PAN-OS versions 11.2.7 ant\u00e9rieures \u00e0 11.2.7-h13",
"product": {
"name": "PAN-OS",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "WildFire WF-500 et WF-500-B versions 12.1.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "Trust Protection Foundation versions 25.1.x ant\u00e9rieures \u00e0 25.1.8",
"product": {
"name": "N/A",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "PAN-OS versions 10.2.13 ant\u00e9rieures \u00e0 10.2.13-h21",
"product": {
"name": "PAN-OS",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
}
],
"affected_systems_content": "L\u0027\u00e9diteur indique que des correctifs seront publi\u00e9s le 28 mai 2026.",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2026-4678",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4678"
},
{
"name": "CVE-2026-4448",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4448"
},
{
"name": "CVE-2026-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5914"
},
{
"name": "CVE-2026-5289",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5289"
},
{
"name": "CVE-2026-4460",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4460"
},
{
"name": "CVE-2026-5886",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5886"
},
{
"name": "CVE-2026-4445",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4445"
},
{
"name": "CVE-2026-5278",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5278"
},
{
"name": "CVE-2026-4444",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4444"
},
{
"name": "CVE-2026-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4673"
},
{
"name": "CVE-2026-0264",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0264"
},
{
"name": "CVE-2026-0241",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0241"
},
{
"name": "CVE-2026-0251",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0251"
},
{
"name": "CVE-2026-4456",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4456"
},
{
"name": "CVE-2026-5272",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5272"
},
{
"name": "CVE-2026-7359",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-7359"
},
{
"name": "CVE-2026-4464",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4464"
},
{
"name": "CVE-2026-8022",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-8022"
},
{
"name": "CVE-2026-7361",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-7361"
},
{
"name": "CVE-2026-5291",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5291"
},
{
"name": "CVE-2026-4457",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4457"
},
{
"name": "CVE-2026-4461",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4461"
},
{
"name": "CVE-2026-5876",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5876"
},
{
"name": "CVE-2026-6921",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-6921"
},
{
"name": "CVE-2026-4447",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4447"
},
{
"name": "CVE-2026-5284",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5284"
},
{
"name": "CVE-2026-5881",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5881"
},
{
"name": "CVE-2026-5282",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5282"
},
{
"name": "CVE-2026-0249",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0249"
},
{
"name": "CVE-2026-4442",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4442"
},
{
"name": "CVE-2026-0263",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0263"
},
{
"name": "CVE-2026-5283",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5283"
},
{
"name": "CVE-2026-4676",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4676"
},
{
"name": "CVE-2026-0265",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0265"
},
{
"name": "CVE-2026-4675",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4675"
},
{
"name": "CVE-2026-0244",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0244"
},
{
"name": "CVE-2026-0258",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0258"
},
{
"name": "CVE-2026-4446",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4446"
},
{
"name": "CVE-2026-4679",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4679"
},
{
"name": "CVE-2026-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4674"
},
{
"name": "CVE-2026-0256",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0256"
},
{
"name": "CVE-2026-0261",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0261"
},
{
"name": "CVE-2026-5274",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5274"
},
{
"name": "CVE-2026-4463",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4463"
},
{
"name": "CVE-2026-5909",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5909"
},
{
"name": "CVE-2026-0243",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0243"
},
{
"name": "CVE-2026-0242",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0242"
},
{
"name": "CVE-2026-4441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4441"
},
{
"name": "CVE-2026-0239",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0239"
},
{
"name": "CVE-2026-7981",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-7981"
},
{
"name": "CVE-2026-5276",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5276"
},
{
"name": "CVE-2026-6305",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-6305"
},
{
"name": "CVE-2026-0250",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0250"
},
{
"name": "CVE-2026-4439",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4439"
},
{
"name": "CVE-2026-5893",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5893"
},
{
"name": "CVE-2026-5285",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5285"
},
{
"name": "CVE-2026-4452",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4452"
},
{
"name": "CVE-2026-4462",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4462"
},
{
"name": "CVE-2026-4680",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4680"
},
{
"name": "CVE-2026-0237",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0237"
},
{
"name": "CVE-2026-4677",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4677"
},
{
"name": "CVE-2026-5919",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5919"
},
{
"name": "CVE-2026-6361",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-6361"
},
{
"name": "CVE-2026-0238",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0238"
},
{
"name": "CVE-2026-8018",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-8018"
},
{
"name": "CVE-2026-7363",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-7363"
},
{
"name": "CVE-2026-5273",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5273"
},
{
"name": "CVE-2026-4458",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4458"
},
{
"name": "CVE-2026-4459",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4459"
},
{
"name": "CVE-2026-0246",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0246"
},
{
"name": "CVE-2026-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4450"
},
{
"name": "CVE-2026-5275",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5275"
},
{
"name": "CVE-2026-4455",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4455"
},
{
"name": "CVE-2026-0262",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0262"
},
{
"name": "CVE-2026-5280",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5280"
},
{
"name": "CVE-2026-5286",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5286"
},
{
"name": "CVE-2026-0257",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0257"
},
{
"name": "CVE-2026-5884",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5884"
},
{
"name": "CVE-2026-5287",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5287"
},
{
"name": "CVE-2026-4449",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4449"
},
{
"name": "CVE-2026-5277",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5277"
},
{
"name": "CVE-2026-7343",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-7343"
},
{
"name": "CVE-2026-5292",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5292"
},
{
"name": "CVE-2026-5290",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5290"
},
{
"name": "CVE-2026-0245",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0245"
},
{
"name": "CVE-2026-0248",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0248"
},
{
"name": "CVE-2026-0235",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0235"
},
{
"name": "CVE-2026-4451",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4451"
},
{
"name": "CVE-2026-4440",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4440"
},
{
"name": "CVE-2026-0247",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0247"
},
{
"name": "CVE-2026-0236",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0236"
},
{
"name": "CVE-2026-5281",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5281"
},
{
"name": "CVE-2026-0240",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0240"
},
{
"name": "CVE-2026-4443",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4443"
},
{
"name": "CVE-2026-5288",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5288"
},
{
"name": "CVE-2026-0259",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0259"
},
{
"name": "CVE-2026-5279",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5279"
},
{
"name": "CVE-2026-4453",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4453"
},
{
"name": "CVE-2026-4454",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4454"
}
],
"initial_release_date": "2026-05-15T00:00:00",
"last_revision_date": "2026-05-15T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0596",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-05-15T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Injection SQL (SQLi)"
},
{
"description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Palo Alto Networks. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Palo Alto Networks",
"vendor_advisories": [
{
"published_at": "2026-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2026-0242",
"url": "https://security.paloaltonetworks.com/CVE-2026-0242"
},
{
"published_at": "2026-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2026-0251",
"url": "https://security.paloaltonetworks.com/CVE-2026-0251"
},
{
"published_at": "2026-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2026-0238",
"url": "https://security.paloaltonetworks.com/CVE-2026-0238"
},
{
"published_at": "2026-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2026-0263",
"url": "https://security.paloaltonetworks.com/CVE-2026-0263"
},
{
"published_at": "2026-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2026-0259",
"url": "https://security.paloaltonetworks.com/CVE-2026-0259"
},
{
"published_at": "2026-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2026-0257",
"url": "https://security.paloaltonetworks.com/CVE-2026-0257"
},
{
"published_at": "2026-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2026-0262",
"url": "https://security.paloaltonetworks.com/CVE-2026-0262"
},
{
"published_at": "2026-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2026-0243",
"url": "https://security.paloaltonetworks.com/CVE-2026-0243"
},
{
"published_at": "2026-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2026-0247",
"url": "https://security.paloaltonetworks.com/CVE-2026-0247"
},
{
"published_at": "2026-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2026-0261",
"url": "https://security.paloaltonetworks.com/CVE-2026-0261"
},
{
"published_at": "2026-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2026-0240",
"url": "https://security.paloaltonetworks.com/CVE-2026-0240"
},
{
"published_at": "2026-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2026-0239",
"url": "https://security.paloaltonetworks.com/CVE-2026-0239"
},
{
"published_at": "2026-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2026-0248",
"url": "https://security.paloaltonetworks.com/CVE-2026-0248"
},
{
"published_at": "2026-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2026-0246",
"url": "https://security.paloaltonetworks.com/CVE-2026-0246"
},
{
"published_at": "2026-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks PAN-SA-2026-0007",
"url": "https://security.paloaltonetworks.com/PAN-SA-2026-0007"
},
{
"published_at": "2026-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2026-0265",
"url": "https://security.paloaltonetworks.com/CVE-2026-0265"
},
{
"published_at": "2026-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2026-0250",
"url": "https://security.paloaltonetworks.com/CVE-2026-0250"
},
{
"published_at": "2026-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2026-0264",
"url": "https://security.paloaltonetworks.com/CVE-2026-0264"
},
{
"published_at": "2026-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2026-0256",
"url": "https://security.paloaltonetworks.com/CVE-2026-0256"
},
{
"published_at": "2026-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2026-0241",
"url": "https://security.paloaltonetworks.com/CVE-2026-0241"
},
{
"published_at": "2026-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2026-0245",
"url": "https://security.paloaltonetworks.com/CVE-2026-0245"
},
{
"published_at": "2026-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2026-0258",
"url": "https://security.paloaltonetworks.com/CVE-2026-0258"
},
{
"published_at": "2026-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2026-0249",
"url": "https://security.paloaltonetworks.com/CVE-2026-0249"
},
{
"published_at": "2026-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2026-0244",
"url": "https://security.paloaltonetworks.com/CVE-2026-0244"
}
]
}
FKIE_CVE-2026-0251
Vulnerability from fkie_nvd - Published: 2026-05-13 19:16 - Updated: 2026-05-14 16:21| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple local privilege escalation vulnerabilities in the Palo Alto Networks GlobalProtect\u2122 app allow a local user to escalate their privileges to NT AUTHORITY\\SYSTEM on Windows and root on macOS and Linux. This enables a non-administrative user to execute arbitrary commands with administrative privileges.\n\nThe GlobalProtect app on iOS, Android, Chrome OS and GlobalProtect UWP app are not affected."
}
],
"id": "CVE-2026-0251",
"lastModified": "2026-05-14T16:21:23.190",
"metrics": {
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NO",
"Recovery": "USER",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "LOCAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "UNREPORTED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "AMBER",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "DIFFUSE",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:U/V:D/RE:M/U:Amber",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "MODERATE"
},
"source": "psirt@paloaltonetworks.com",
"type": "Secondary"
}
]
},
"published": "2026-05-13T19:16:59.470",
"references": [
{
"source": "psirt@paloaltonetworks.com",
"url": "https://security.paloaltonetworks.com/CVE-2026-0251"
}
],
"sourceIdentifier": "psirt@paloaltonetworks.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-426"
}
],
"source": "psirt@paloaltonetworks.com",
"type": "Secondary"
}
]
}
GHSA-H94G-F37W-QXPJ
Vulnerability from github – Published: 2026-05-13 21:32 – Updated: 2026-05-13 21:32Multiple local privilege escalation vulnerabilities in the Palo Alto Networks GlobalProtect™ app allow a local user to escalate their privileges to NT AUTHORITY\SYSTEM on Windows and root on macOS and Linux. This enables a non-administrative user to execute arbitrary commands with administrative privileges.
The GlobalProtect app on iOS, Android, Chrome OS and GlobalProtect UWP app are not affected.
{
"affected": [],
"aliases": [
"CVE-2026-0251"
],
"database_specific": {
"cwe_ids": [
"CWE-426"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2026-05-13T19:16:59Z",
"severity": "MODERATE"
},
"details": "Multiple local privilege escalation vulnerabilities in the Palo Alto Networks GlobalProtect\u2122 app allow a local user to escalate their privileges to NT AUTHORITY\\SYSTEM on Windows and root on macOS and Linux. This enables a non-administrative user to execute arbitrary commands with administrative privileges.\n\nThe GlobalProtect app on iOS, Android, Chrome OS and GlobalProtect UWP app are not affected.",
"id": "GHSA-h94g-f37w-qxpj",
"modified": "2026-05-13T21:32:05Z",
"published": "2026-05-13T21:32:05Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-0251"
},
{
"type": "WEB",
"url": "https://security.paloaltonetworks.com/CVE-2026-0251"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:U/V:D/RE:M/U:Amber",
"type": "CVSS_V4"
}
]
}
WID-SEC-W-2026-1542
Vulnerability from csaf_certbund - Published: 2026-05-14 22:00 - Updated: 2026-05-17 22:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Google Chrome <148.0.7778.168
Google / Chrome
|
<148.0.7778.168 | ||
|
Google Chrome <148.0.7778.167
Google / Chrome
|
<148.0.7778.167 | ||
|
Microsoft Edge <148.0.3967.70
Microsoft / Edge
|
<148.0.3967.70 |
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Chrome ist ein Internet-Browser von Google.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Google Chrome und Microsoft Edge ausnutzen, um beliebigen Programmcode auszuf\u00fchren, um einen Denial of Service Angriff durchzuf\u00fchren, um Informationen offenzulegen, um Sicherheitsvorkehrungen zu umgehen, und um einen nicht n\u00e4her spezifizierten Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- MacOS X\n- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2026-1542 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-1542.json"
},
{
"category": "self",
"summary": "WID-SEC-2026-1542 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1542"
},
{
"category": "external",
"summary": "Chrome Releases: Stable Channel Update for Desktop vom 2026-05-14",
"url": "https://chromereleases.googleblog.com/2026/05/stable-channel-update-for-desktop_12.html"
},
{
"category": "external",
"summary": "Release notes for Microsoft Edge Security Updates vom 2026-05-15",
"url": "https://learn.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security#may-15-2026"
}
],
"source_lang": "en-US",
"title": "Google Chrome und Microsoft Edge: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-05-17T22:00:00.000+00:00",
"generator": {
"date": "2026-05-18T05:16:10.220+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2026-1542",
"initial_release_date": "2026-05-14T22:00:00.000+00:00",
"revision_history": [
{
"date": "2026-05-14T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2026-05-17T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Microsoft aufgenommen"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c148.0.7778.167",
"product": {
"name": "Google Chrome \u003c148.0.7778.167",
"product_id": "T054196"
}
},
{
"category": "product_version",
"name": "148.0.7778.167",
"product": {
"name": "Google Chrome 148.0.7778.167",
"product_id": "T054196-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:google:chrome:148.0.7778.167"
}
}
},
{
"category": "product_version_range",
"name": "\u003c148.0.7778.168",
"product": {
"name": "Google Chrome \u003c148.0.7778.168",
"product_id": "T054197"
}
},
{
"category": "product_version",
"name": "148.0.7778.168",
"product": {
"name": "Google Chrome 148.0.7778.168",
"product_id": "T054197-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:google:chrome:148.0.7778.168"
}
}
}
],
"category": "product_name",
"name": "Chrome"
}
],
"category": "vendor",
"name": "Google"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c148.0.3967.70",
"product": {
"name": "Microsoft Edge \u003c148.0.3967.70",
"product_id": "T054236"
}
},
{
"category": "product_version",
"name": "148.0.3967.70",
"product": {
"name": "Microsoft Edge 148.0.3967.70",
"product_id": "T054236-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:edge:148.0.3967.70"
}
}
}
],
"category": "product_name",
"name": "Edge"
}
],
"category": "vendor",
"name": "Microsoft"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-0251",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-0251"
},
{
"cve": "CVE-2026-45351",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-45351"
},
{
"cve": "CVE-2026-8509",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8509"
},
{
"cve": "CVE-2026-8510",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8510"
},
{
"cve": "CVE-2026-8511",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8511"
},
{
"cve": "CVE-2026-8512",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8512"
},
{
"cve": "CVE-2026-8513",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8513"
},
{
"cve": "CVE-2026-8514",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8514"
},
{
"cve": "CVE-2026-8515",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8515"
},
{
"cve": "CVE-2026-8516",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8516"
},
{
"cve": "CVE-2026-8517",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8517"
},
{
"cve": "CVE-2026-8518",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8518"
},
{
"cve": "CVE-2026-8519",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8519"
},
{
"cve": "CVE-2026-8520",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8520"
},
{
"cve": "CVE-2026-8521",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8521"
},
{
"cve": "CVE-2026-8522",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8522"
},
{
"cve": "CVE-2026-8523",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8523"
},
{
"cve": "CVE-2026-8524",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8524"
},
{
"cve": "CVE-2026-8525",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8525"
},
{
"cve": "CVE-2026-8526",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8526"
},
{
"cve": "CVE-2026-8527",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8527"
},
{
"cve": "CVE-2026-8528",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8528"
},
{
"cve": "CVE-2026-8529",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8529"
},
{
"cve": "CVE-2026-8530",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8530"
},
{
"cve": "CVE-2026-8531",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8531"
},
{
"cve": "CVE-2026-8532",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8532"
},
{
"cve": "CVE-2026-8533",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8533"
},
{
"cve": "CVE-2026-8534",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8534"
},
{
"cve": "CVE-2026-8535",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8535"
},
{
"cve": "CVE-2026-8536",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8536"
},
{
"cve": "CVE-2026-8537",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8537"
},
{
"cve": "CVE-2026-8538",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8538"
},
{
"cve": "CVE-2026-8539",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8539"
},
{
"cve": "CVE-2026-8540",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8540"
},
{
"cve": "CVE-2026-8541",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8541"
},
{
"cve": "CVE-2026-8542",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8542"
},
{
"cve": "CVE-2026-8543",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8543"
},
{
"cve": "CVE-2026-8544",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8544"
},
{
"cve": "CVE-2026-8545",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8545"
},
{
"cve": "CVE-2026-8546",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8546"
},
{
"cve": "CVE-2026-8547",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8547"
},
{
"cve": "CVE-2026-8548",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8548"
},
{
"cve": "CVE-2026-8549",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8549"
},
{
"cve": "CVE-2026-8550",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8550"
},
{
"cve": "CVE-2026-8551",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8551"
},
{
"cve": "CVE-2026-8552",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8552"
},
{
"cve": "CVE-2026-8553",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8553"
},
{
"cve": "CVE-2026-8554",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8554"
},
{
"cve": "CVE-2026-8555",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8555"
},
{
"cve": "CVE-2026-8556",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8556"
},
{
"cve": "CVE-2026-8557",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8557"
},
{
"cve": "CVE-2026-8558",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8558"
},
{
"cve": "CVE-2026-8559",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8559"
},
{
"cve": "CVE-2026-8560",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8560"
},
{
"cve": "CVE-2026-8561",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8561"
},
{
"cve": "CVE-2026-8562",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8562"
},
{
"cve": "CVE-2026-8563",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8563"
},
{
"cve": "CVE-2026-8564",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8564"
},
{
"cve": "CVE-2026-8565",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8565"
},
{
"cve": "CVE-2026-8566",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8566"
},
{
"cve": "CVE-2026-8567",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8567"
},
{
"cve": "CVE-2026-8568",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8568"
},
{
"cve": "CVE-2026-8569",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8569"
},
{
"cve": "CVE-2026-8570",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8570"
},
{
"cve": "CVE-2026-8571",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8571"
},
{
"cve": "CVE-2026-8572",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8572"
},
{
"cve": "CVE-2026-8573",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8573"
},
{
"cve": "CVE-2026-8574",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8574"
},
{
"cve": "CVE-2026-8575",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8575"
},
{
"cve": "CVE-2026-8576",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8576"
},
{
"cve": "CVE-2026-8577",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8577"
},
{
"cve": "CVE-2026-8578",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8578"
},
{
"cve": "CVE-2026-8579",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8579"
},
{
"cve": "CVE-2026-8580",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8580"
},
{
"cve": "CVE-2026-8581",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8581"
},
{
"cve": "CVE-2026-8582",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8582"
},
{
"cve": "CVE-2026-8583",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8583"
},
{
"cve": "CVE-2026-8584",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8584"
},
{
"cve": "CVE-2026-8585",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8585"
},
{
"cve": "CVE-2026-8586",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8586"
},
{
"cve": "CVE-2026-8587",
"product_status": {
"known_affected": [
"T054197",
"T054196",
"T054236"
]
},
"release_date": "2026-05-14T22:00:00.000+00:00",
"title": "CVE-2026-8587"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.