CVE-2026-0248 PUBLISHED

Prisma Access Agent: Improper Certificate Validation Vulnerability

Assigner: palo_alto
Reserved: 03.11.2025 Published: 13.05.2026 Updated: 13.05.2026

An improper certificate validation vulnerability in the Prisma Access Agent® for Android and Chrome OS enables an attacker to perform a man-in-the-middle (MitM) attack to intercept VPN traffic. By presenting a certificate for any domain issued by a trusted Certificate Authority, the attacker can capture sensitive device information.

The Prisma Access Agent on macOS, Windows, Linux and iOS are not affected.

Metrics

CVSS Vector: CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:L/SI:L/SA:N/E:U/AU:Y/R:A/V:D/RE:M/U:Amber
CVSS Score: 6.2

Product Status

Vendor Palo Alto Networks
Product Prisma Access Agent
Versions Default: unaffected
  • affected from 0 to 26.2.1 (excl.)
Vendor Palo Alto Networks
Product Prisma Access Agent
Versions Default: unaffected
  • Version All is unaffected

Exploits

Palo Alto Networks is not aware of any malicious exploitation of this issue.

Credits

  • Palo Alto Networks thanks our internal security research teams for discovering and reporting this issue. other

References

Problem Types

  • CWE-295 Improper Certificate Validation CWE

Impacts

  • CAPEC-94 Adversary in the Middle (AiTM)