CVE-2026-0240 Trust Protection Foundation: Sensitive Information Disclosure Vulnerability
Exploit Maturity
UNREPORTED
Response Effort
MODERATE
Recovery
USER
Value Density
DIFFUSE
Attack Vector
ADJACENT
Attack Complexity
LOW
Attack Requirements
PRESENT
Automatable
NO
User Interaction
NONE
Product Confidentiality
HIGH
Product Integrity
HIGH
Product Availability
NONE
Privileges Required
LOW
Subsequent Confidentiality
LOW
Subsequent Integrity
LOW
Subsequent Availability
NONE
Description
An information disclosure vulnerability in Trust Protection Foundation enables an authenticated attacker to obtain sensitive information from the server's vault. Successful exploitation of this issue allows the attacker to impersonate any user within the environment and arbitrarily modify configuration settings.
Product Status
| Versions | Affected | Unaffected |
|---|---|---|
| Trust Protection Foundation 25.3.0 | < 25.3.3 | >= 25.3.3 |
| Trust Protection Foundation 25.1.0 | < 25.1.8 | >= 25.1.8 |
| Trust Protection Foundation 24.3.0 | < 24.3.6 | >= 24.3.6 |
| Trust Protection Foundation 24.1.0 | < 24.1.13 | >= 24.1.13 |
Required Configuration for Exposure
No specific configuration is required for exposure to this vulnerability.
Severity: MEDIUM, Suggested Urgency: MODERATE
CVSS-BT: 4.5 / CVSS-B: 7.4 (CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:N/SC:L/SI:L/SA:N/E:U/AU:N/R:U/V:D/RE:M/U:Amber)
Exploitation Status
Palo Alto Networks is not aware of any malicious exploitation of this issue.
Weakness Type and Impact
CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere
CAPEC-37 Retrieve Embedded Sensitive Data
Solution
| Version | Minor Version | Suggested Solution |
| Trust Protection Foundation 25.3 | 25.3.0 through 25.3.2 | Upgrade to 25.3.3 or later. |
| Trust Protection Foundation 25.1 | 25.1.0 through 25.1.7 | Upgrade to 25.1.8 or later. |
| Trust Protection Foundation 24.3 | 24.3.0 through 24.3.5 | Upgrade to 24.3.6 or later. |
| Trust Protection Foundation 24.1 | 24.1.0 through 24.1.12 | Upgrade to 24.1.13 or later. |
Workarounds and Mitigations
No known workarounds exist for this issue.
Acknowledgments
Palo Alto Networks thanks our internal security research teams for discovering and reporting this issue.
CPE Applicability
- cpe:2.3:a:palo_alto_networks:trust_protection_foundation:*:*:*:*:*:*:*:* is vulnerable from (including)25.3.0 and up to (excluding)25.3.3
- ORcpe:2.3:a:palo_alto_networks:trust_protection_foundation:*:*:*:*:*:*:*:* is vulnerable from (including)25.1.0 and up to (excluding)25.1.8
- ORcpe:2.3:a:palo_alto_networks:trust_protection_foundation:*:*:*:*:*:*:*:* is vulnerable from (including)24.3.0 and up to (excluding)24.3.6
- ORcpe:2.3:a:palo_alto_networks:trust_protection_foundation:*:*:*:*:*:*:*:* is vulnerable from (including)24.1.0 and up to (excluding)24.1.13
Timeline
Initial publication.