Generated remediation guidance and an executive summary. No account required.
An insufficient certification validation issue in the Palo Alto Networks GlobalProtect app enables attackers to connect the GlobalProtect app to arbitrary servers. This can enable a local non-administrative operating system user or an attacker on the same subnet to install malicious root certificates on the endpoint and subsequently install malicious software signed by the malicious root certificates on that endpoint. Please subscribe to our RSS feed https://security.paloaltonetworks.com/rss.xml to be alerted to new updates to this and other advisories.
Use CWE-295, Paloaltonetworks vendor hub and Globalprotect product page to widen CVE-2024-5921 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2025-4232, CVE-2024-3661 and CVE-2025-0120 for nearby disclosures in the same product family.