CVE-2026-0246 PUBLISHED

Prisma Access Agent: Local Privilege Escalation Vulnerability

Assigner: palo_alto
Reserved: 03.11.2025 Published: 13.05.2026 Updated: 13.05.2026

A vulnerability with a privilege management mechanism in the Palo Alto Networks Prisma Access Agent® enables a locally authenticated non-administrative user to escalate their privileges to root on macOS and Linux or NT AUTHORITY\SYSTEM on Windows. This allows the user to execute arbitrary code and read sensitive information otherwise accessible only to privileged accounts.

The Prisma Access Agent on iOS, Android and Chrome OS are not affected.

Metrics

CVSS Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/AU:N/R:U/V:D/RE:M/U:Amber
CVSS Score: 5.9

Product Status

Vendor Palo Alto Networks
Product Prisma Access Agent
Versions Default: unaffected
  • affected from 0 to 26.2.1 (excl.)
Vendor Palo Alto Networks
Product Prisma Access Agent
Versions Default: unaffected
  • affected from 0 to 26.2.1 (excl.)
Vendor Palo Alto Networks
Product Prisma Access Agent
Versions Default: unaffected
  • affected from 0 to 26.2.1 (excl.)
Vendor Palo Alto Networks
Product Prisma Access Agent
Versions Default: unaffected
  • Version All is unaffected

Exploits

Palo Alto Networks is not aware of any malicious exploitation of these issues.

Credits

  • Palo Alto Networks thanks our internal security research teams for discovering and reporting this issue. other

References

Problem Types

  • CWE-862 Missing Authorization CWE

Impacts

  • CAPEC-233 Privilege Escalation