Palo Alto Networks Security Advisories / CVE-2026-0231

CVE-2026-0231 Cortex XDR Broker VM: Sensitive Information Disclosure Vulnerability

Urgency MODERATE

047910
Severity 5.7 · MEDIUM
Exploit Maturity UNREPORTED
Response Effort MODERATE
Recovery USER
Value Density DIFFUSE
Attack Vector LOCAL
Attack Complexity LOW
Attack Requirements NONE
Automatable NO
User Interaction NONE
Product Confidentiality HIGH
Product Integrity HIGH
Product Availability HIGH
Privileges Required HIGH
Subsequent Confidentiality NONE
Subsequent Integrity NONE
Subsequent Availability NONE

Description

An information disclosure vulnerability in Palo Alto Networks Cortex XDR® Broker VM allows an authenticated user to obtain and modify sensitive information by triggering live terminal session via Cortex UI and modifying any configuration setting

The attacker must have network access to the Broker VM to exploit this issue.

Product Status

VersionsAffectedUnaffected
Cortex XDR Broker VM 30.0.0< 30.0.49>= 30.0.49

Required Configuration for Exposure

No special configuration is required to be affected by this issue.

Severity: MEDIUM, Suggested Urgency: MODERATE

CVSS-BT: 5.7 / CVSS-B: 8.4 (CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/AU:N/R:U/V:D/RE:M/U:Amber)

Exploitation Status

Palo Alto Networks is not aware of any malicious exploitation of this issue.

Weakness Type and Impact

CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere

CAPEC-37 Retrieve Embedded Sensitive Data

Solution

This issue is fixed in Cortex XDR Broker VM 30.0.49, and all later Cortex XDR Broker VM versions.

Workarounds and Mitigations

No known workarounds exist for this issue.

Acknowledgments

Palo Alto Networks thanks an internal reporter, Nicola Kalak, for discovering and reporting this issue.

CPE Applicability

Timeline

Initial Publication
© 2026 Palo Alto Networks, Inc. All rights reserved.