Palo Alto Networks Security Advisories / CVE-2026-0240

CVE-2026-0240 Trust Protection Foundation: Sensitive Information Disclosure Vulnerability

Urgency MODERATE

047910
Severity 4.5 · MEDIUM
Exploit Maturity UNREPORTED
Response Effort MODERATE
Recovery USER
Value Density DIFFUSE
Attack Vector ADJACENT
Attack Complexity LOW
Attack Requirements PRESENT
Automatable NO
User Interaction NONE
Product Confidentiality HIGH
Product Integrity HIGH
Product Availability NONE
Privileges Required LOW
Subsequent Confidentiality LOW
Subsequent Integrity LOW
Subsequent Availability NONE

Description

An information disclosure vulnerability in Trust Protection Foundation enables an authenticated attacker to obtain sensitive information from the server's vault. Successful exploitation of this issue allows the attacker to impersonate any user within the environment and arbitrarily modify configuration settings.

Product Status

VersionsAffectedUnaffected
Trust Protection Foundation 25.3.0< 25.3.3
>= 25.3.3
Trust Protection Foundation 25.1.0< 25.1.8
>= 25.1.8
Trust Protection Foundation 24.3.0< 24.3.6
>= 24.3.6
Trust Protection Foundation 24.1.0< 24.1.13
>= 24.1.13

Required Configuration for Exposure

No specific configuration is required for exposure to this vulnerability.

Severity: MEDIUM, Suggested Urgency: MODERATE

CVSS-BT: 4.5 / CVSS-B: 7.4 (CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:N/SC:L/SI:L/SA:N/E:U/AU:N/R:U/V:D/RE:M/U:Amber)

Exploitation Status

Palo Alto Networks is not aware of any malicious exploitation of this issue.

Weakness Type and Impact

CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere

CAPEC-37 Retrieve Embedded Sensitive Data

Solution

VersionMinor VersionSuggested Solution
Trust Protection Foundation 25.325.3.0 through 25.3.2Upgrade to 25.3.3 or later.
Trust Protection Foundation 25.125.1.0 through 25.1.7Upgrade to 25.1.8 or later.
Trust Protection Foundation 24.324.3.0 through 24.3.5Upgrade to 24.3.6 or later.
Trust Protection Foundation 24.124.1.0 through 24.1.12Upgrade to 24.1.13 or later.

Workarounds and Mitigations

No known workarounds exist for this issue.

Acknowledgments

Palo Alto Networks thanks our internal security research teams for discovering and reporting this issue.

CPE Applicability

Timeline

Initial publication.
© 2026 Palo Alto Networks, Inc. All rights reserved.