The Prisma Access Agent on macOS, Windows, Linux and iOS are not affected.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://security.paloaltonetworks.com/CVE-2026-0248 |
|
Thu, 14 May 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Palo Alto Networks prisma Access
|
|
| Vendors & Products |
Palo Alto Networks prisma Access
|
Wed, 13 May 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 13 May 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An improper certificate validation vulnerability in the Prisma Access Agent® for Android and Chrome OS enables an attacker to perform a man-in-the-middle (MitM) attack to intercept VPN traffic. By presenting a certificate for any domain issued by a trusted Certificate Authority, the attacker can capture sensitive device information. The Prisma Access Agent on macOS, Windows, Linux and iOS are not affected. | |
| Title | Prisma Access Agent: Improper Certificate Validation Vulnerability | |
| First Time appeared |
Palo Alto Networks
Palo Alto Networks prisma Access Agent |
|
| Weaknesses | CWE-295 | |
| CPEs | cpe:2.3:a:palo_alto_networks:prisma_access_agent:*:*:android:*:*:*:*:* cpe:2.3:a:palo_alto_networks:prisma_access_agent:*:*:chrome_os:*:*:*:*:* cpe:2.3:a:palo_alto_networks:prisma_access_agent:all:*:ios:*:*:*:*:* cpe:2.3:a:palo_alto_networks:prisma_access_agent:all:*:linux:*:*:*:*:* cpe:2.3:a:palo_alto_networks:prisma_access_agent:all:*:macos:*:*:*:*:* cpe:2.3:a:palo_alto_networks:prisma_access_agent:all:*:windows:*:*:*:*:* |
|
| Vendors & Products |
Palo Alto Networks
Palo Alto Networks prisma Access Agent |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: palo_alto
Published:
Updated: 2026-05-13T19:29:24.329Z
Reserved: 2025-11-03T20:44:09.168Z
Link: CVE-2026-0248
Updated: 2026-05-13T19:29:19.060Z
Status : Awaiting Analysis
Published: 2026-05-13T19:16:58.920
Modified: 2026-05-14T16:21:23.190
Link: CVE-2026-0248
No data.
OpenCVE Enrichment
Updated: 2026-05-14T14:33:45Z