- What is the severity of CVE-2025-4227?
- CVE-2025-4227 has been scored as a low severity vulnerability.
- How to fix CVE-2025-4227?
- To fix CVE-2025-4227: 1. Upgrade the GlobalProtect App to one of the unaffected versions: Version Minor Version Suggested Solution GlobalProtect App 6.3 on Windows, macOS 6.3.3 6.3.0 through 6.3.2 No solution available. A 6.3.3 hotfix is planned. (ETA: 12 June 2025). Upgrade to 6.3.2-566 or later. GlobalProtect App 6.2 on Windows, macOS6.2.0 through 6.2.8-223Upgrade to 6.3.2-566 or later. A new hotfix for 6.2.8 is planned. (ETA: June 2025). GlobalProtect App 6.1 on Windows, macOSAllUpgrade to 6.3.2-566 or later. GlobalProtect App 6.0 on Windows, macOSAllUpgrade to 6.3.2-566 or later. GlobalProtect App on Linux, Android, iOS, Chrome OS, UWPAllNot applicable. 2. Ensure that "Endpoint Traffic Policy Enforcement" is set to “All Traffic” under the GlobalProtect App Configurations. * Network > GlobalProtect > Portals > (Open Portal configuration) > Agent tab > (Open Agent configuration) > App tab > App Configurations > Endpoint Traffic Policy Enforcement (Select: All Traffic) 3. GlobalProtect Portal: Enable "Allow Gateway Access from GlobalProtect Only" (Requires Content version 8977 or newer). This must be enabled in conjunction with "Endpoint Traffic Policy Enforcement" under the GlobalProtect App Configurations. * Network > GlobalProtect > Portals > (Open Portal configuration) > Agent tab > (Open Agent configuration) > App tab > App Configurations > Allow Gateway Access from GlobalProtect Only (Select: Yes) 4. Commit your configuration.
- Is CVE-2025-4227 being actively exploited in the wild?
- As for now, there are no information to confirm that CVE-2025-4227 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
- What software or system is affected by CVE-2025-4227?
- CVE-2025-4227 affects Palo Alto Networks GlobalProtect App, Palo Alto Networks GlobalProtect App.