CVE-2026-0233 Autonomous Digital Experience Manager: Improper validation of ADEM certificate
Exploit Maturity
UNREPORTED
Response Effort
MODERATE
Recovery
USER
Value Density
DIFFUSE
Attack Vector
ADJACENT
Attack Complexity
LOW
Attack Requirements
PRESENT
Automatable
NO
User Interaction
NONE
Product Confidentiality
HIGH
Product Integrity
HIGH
Product Availability
HIGH
Privileges Required
NONE
Subsequent Confidentiality
NONE
Subsequent Integrity
NONE
Subsequent Availability
NONE
Description
A certificate validation vulnerability in Palo Alto Networks Autonomous Digital Experience Manager on Windows allows an unauthenticated attacker with adjacent network access to execute arbitrary code with NT AUTHORITY\SYSTEM privileges.
Product Status
| Versions | Affected | Unaffected |
|---|---|---|
| Autonomous Digital Experience Manager 5.10.0 | < 5.10.14 on Windows | >= 5.10.14 on Windows |
Required Configuration for Exposure
No special configuration is required to be affected by this issue.
Severity: MEDIUM, Suggested Urgency: REDUCED
CVSS-BT: 5.2 / CVSS-B: 7.7 (CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/AU:N/R:U/V:D/RE:M/U:Green)
Exploitation Status
Palo Alto Networks is not aware of any malicious exploitation of this issue.
Weakness Type and Impact
CWE-295: Improper Certificate Validation
CAPEC-187 Malicious Automated Software Update
Solution
| Version | Minor Version | Suggested Solution |
|---|---|---|
| Autonomous Digital Experience Manager 5.10 on Windows |
5.10.0 through 5.10.14 | Upgrade to 5.10.14 or later. |
Workarounds and Mitigations
No known workarounds exist for this issue.
Acknowledgments
Palo Alto Networks thanks David Fischer with OBI for discovering and reporting this issue.
CPE Applicability
- cpe:2.3:a:palo_alto_networks:autonomous_digital_experience_manager:*:*:*:*:*:Windows:*:* is vulnerable from (including)5.10.0 and up to (excluding)5.10.14
Timeline
Corrected the version ranges.
Initial publication.