Generated remediation guidance and an executive summary. No account required.
An improper access control vulnerability in the Endpoint Traffic Policy Enforcement https://docs.paloaltonetworks.com/globalprotect/6-0/globalprotect-app-new-features/new-features-released-in-gp-app/endpoint-traffic-policy-enforcement feature of the Palo Alto Networks GlobalProtect™ app allows certain packets to remain unencrypted instead of being properly secured within the tunnel. An attacker with physical access to the network can inject rogue devices to intercept these packets. Under normal operating conditions, the GlobalProtect app automatically recovers from this interception within one minute.
Use CWE-319, Paloaltonetworks vendor hub and Globalprotect product page to widen CVE-2025-4227 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2025-4232, CVE-2024-3661 and CVE-2025-0120 for nearby disclosures in the same product family.