CVE-2026-0239 Chronosphere Chronocollector Information Disclosure Vulnerability
Exploit Maturity
UNREPORTED
Response Effort
MODERATE
Recovery
USER
Value Density
CONCENTRATED
Attack Vector
ADJACENT
Attack Complexity
LOW
Attack Requirements
NONE
Automatable
NO
User Interaction
NONE
Product Confidentiality
HIGH
Product Integrity
NONE
Product Availability
NONE
Privileges Required
NONE
Subsequent Confidentiality
NONE
Subsequent Integrity
NONE
Subsequent Availability
NONE
Description
An information disclosure vulnerability in the Chronosphere Chronocollector enables an unauthenticated attacker with network access to the collector service to retrieve sensitive information.
Product Status
| Versions | Affected | Unaffected |
|---|---|---|
| Chronosphere Chronocollector | < v0.116.0 | >= v0.116.0 |
Required Configuration for Exposure
No special configuration is required to be affected by this issue.
Severity: MEDIUM, Suggested Urgency: MODERATE
CVSS-BT: 4.9 / CVSS-B: 7.1 (CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/AU:N/R:U/V:C/RE:M/U:Amber)
Exploitation Status
Palo Alto Networks is not aware of any malicious exploitation of this issue.
Weakness Type and Impact
CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere
CAPEC-37 Retrieve Embedded Sensitive Data
Solution
| Version | Suggested Solution |
|---|---|
| Chronosphere Chronocollector | Upgrade to v0.116.0 or later. |
Workarounds and Mitigations
No known workarounds exist for this issue.
Acknowledgments
Palo Alto Networks thanks our internal security research teams for discovering and reporting this issue.
CPE Applicability
- cpe:2.3:a:palo_alto_networks:chronosphere_chronocollector:*:*:*:*:*:*:*:* is vulnerable from (including)0.0.0 and up to (excluding)v0.116.0
Timeline
Initial publication.