CVE-2026-0228 PAN-OS: Improper Validation of Terminal Server Agent Certificate
Description
An improper certificate validation vulnerability in PAN-OS allows users to connect Terminal Server Agents on Windows to PAN-OS using expired certificates even if the PAN-OS configuration would not normally permit them to do so.
Product Status
| Versions | Affected | Unaffected |
|---|---|---|
| Cloud NGFW | None | All |
| PAN-OS 12.1 | None | All |
| PAN-OS 11.2 | < 11.2.8 | >= 11.2.8 |
| PAN-OS 11.1 | < 11.1.11 | >= 11.1.11 |
| PAN-OS 10.2 | < 10.2.17 | >= 10.2.17 |
| Prisma Access | < 10.2.10-h28 on PAN-OS < 11.2.7-h10 on PAN-OS | >= 10.2.10-h28 on PAN-OS >= 11.2.7-h10 on PAN-OS |
Required Configuration for Exposure
This issue only affects PAN-OS devices that connect to Terminal Server agents on Windows.
Follow these steps to check if PAN-OS devices connect to the Terminal Server agent:
Device > User Identification > Terminal Server Agents
Severity: LOW, Suggested Urgency: MODERATE
CVSS-BT: 1.3 / CVSS-B: 5.3 (CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:L/SI:N/SA:N/E:U/AU:N/R:U/V:D/RE:M/U:Amber)
Exploitation Status
Palo Alto Networks is not aware of any malicious exploitation of this issue.
Weakness Type and Impact
CWE-295 Improper Certificate Validation
CAPEC-114 Authentication Abuse
Solution
| Version | Minor Version | Suggested Solution |
|---|---|---|
| Cloud NGFW | No action needed. | |
| PAN-OS 12.1 | No action needed. | |
| PAN-OS 11.2 |
11.2.0 through 11.2.7 | Upgrade to 11.2.8 or later. |
| PAN-OS 11.1 |
11.1.0 through 11.1.10 | Upgrade to 11.1.11 or later. |
| PAN-OS 10.2 |
10.2.0 through 10.2.16 | Upgrade to 10.2.17 or later. |
| All older unsupported PAN-OS versions | Upgrade to a supported fixed version. | |
| Prisma Access 11.2 on PAN-OS |
11.2.0 through 11.2.7 | Upgrade to 11.2.7-h10 or later. |
| Prisma Access 10.2 on PAN-OS | 10.2.0 through 10.2.10 | Upgrade to 10.2.10-h28 or later. |
Workarounds and Mitigations
No known workarounds exist for this issue.
Acknowledgments
CPEs
cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h8:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h7:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h4:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h3:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h2:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h1:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:-:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:11.2.6:*:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:11.2.5:*:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:*:*:*:*:*:*:*
CPE Applicability
- cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:* is vulnerable from (including)11.2.0 and up to (excluding)11.2.8
- ORcpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:* is vulnerable from (including)11.1.0 and up to (excluding)11.1.11
- ORcpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:* is vulnerable from (including)10.2.0 and up to (excluding)10.2.17
- or
- cpe:2.3:o:palo_alto_networks:prisma_access:*:*:*:*:*:PAN-OS:*:* is vulnerable from (including)11.2.7 and up to (excluding)11.2.7-h10
- ORcpe:2.3:o:palo_alto_networks:prisma_access:*:*:*:*:*:PAN-OS:*:* is vulnerable from (including)10.2.10 and up to (excluding)10.2.10-h28