Home

Description

An improper certificate validation vulnerability in the Prisma Access Agent® for Android and Chrome OS enables an attacker to perform a man-in-the-middle (MitM) attack to intercept VPN traffic. By presenting a certificate for any domain issued by a trusted Certificate Authority, the attacker can capture sensitive device information. The Prisma Access Agent on macOS, Windows, Linux and iOS are not affected.

PUBLISHED Reserved 2025-11-03 | Published 2026-05-13 | Updated 2026-05-13 | Assigner palo_alto




MEDIUM: 6.2CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:L/SI:L/SA:N/E:U/AU:Y/R:A/V:D/RE:M/U:Amber

Problem types

CWE-295 Improper Certificate Validation

Product status

Default status
unaffected

Any version before 26.2.1
affected

Default status
unaffected

All (custom)
unaffected

Timeline

2026-05-13:Initial publication.

Credits

Palo Alto Networks thanks our internal security research teams for discovering and reporting this issue. other

References

security.paloaltonetworks.com/CVE-2026-0248 vendor-advisory

cve.org (CVE-2026-0248)

nvd.nist.gov (CVE-2026-0248)

Download JSON