Palo Alto Networks Security Advisories / CVE-2026-0233

CVE-2026-0233 Autonomous Digital Experience Manager: Improper validation of ADEM certificate

Urgency REDUCED

047910
Severity 5.2 · MEDIUM
Exploit Maturity UNREPORTED
Response Effort MODERATE
Recovery USER
Value Density DIFFUSE
Attack Vector ADJACENT
Attack Complexity LOW
Attack Requirements PRESENT
Automatable NO
User Interaction NONE
Product Confidentiality HIGH
Product Integrity HIGH
Product Availability HIGH
Privileges Required NONE
Subsequent Confidentiality NONE
Subsequent Integrity NONE
Subsequent Availability NONE

Description

A certificate validation vulnerability in Palo Alto Networks Autonomous Digital Experience Manager on Windows allows an unauthenticated attacker with adjacent network access to execute arbitrary code with NT AUTHORITY\SYSTEM privileges.

Product Status

VersionsAffectedUnaffected
Autonomous Digital Experience Manager 5.10.0< 5.10.14 on Windows>= 5.10.14 on Windows

Required Configuration for Exposure

No special configuration is required to be affected by this issue.

Severity: MEDIUM, Suggested Urgency: REDUCED

CVSS-BT: 5.2 / CVSS-B: 7.7 (CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/AU:N/R:U/V:D/RE:M/U:Green)

Exploitation Status

Palo Alto Networks is not aware of any malicious exploitation of this issue.

Weakness Type and Impact

CWE-295: Improper Certificate Validation

CAPEC-187 Malicious Automated Software Update

Solution

Version
Minor Version
Suggested Solution
Autonomous Digital Experience Manager 5.10 on Windows
5.10.0 through 5.10.14 Upgrade to 5.10.14 or later.

Workarounds and Mitigations

No known workarounds exist for this issue.

Acknowledgments

Palo Alto Networks thanks David Fischer with OBI for discovering and reporting this issue.

CPE Applicability

Timeline

Corrected the version ranges.
Initial publication.
© 2026 Palo Alto Networks, Inc. All rights reserved.