Palo Alto Networks Security Advisories / CVE-2026-0245

CVE-2026-0245 Prisma Access Agent: Information Disclosure Vulnerabilities

Urgency MODERATE

047910
Severity 4.3 · MEDIUM
Exploit Maturity UNREPORTED
Response Effort LOW
Recovery USER
Value Density CONCENTRATED
Attack Vector LOCAL
Attack Complexity LOW
Attack Requirements NONE
Automatable NO
User Interaction NONE
Product Confidentiality HIGH
Product Integrity NONE
Product Availability NONE
Privileges Required LOW
Subsequent Confidentiality LOW
Subsequent Integrity NONE
Subsequent Availability NONE

Description

Multiple information disclosure vulnerabilities in Prisma Access Agent® allow a local user to access sensitive configuration data and credentials.

The Prisma Access Agent on Linux, ChromeOS, Android, and iOS are not affected.

Product Status

VersionsAffectedUnaffected
Prisma Access AgentNone on Linux
None on Android
None on ChromeOS
None on iOS
All on Linux
All on Android
All on ChromeOS
All on iOS
Prisma Access Agent < 26.2.1 on macOS
< 26.2.1 on Windows
>= 26.2.1 on macOS
>= 26.2.1 on Windows

Required Configuration for Exposure

No special configuration is required.

Severity: MEDIUM, Suggested Urgency: MODERATE

CVSS-BT: 4.3 / CVSS-B: 6.8 (CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:L/SI:N/SA:N/E:U/AU:N/R:U/V:C/RE:L/U:Amber)

Exploitation Status

Palo Alto Networks is not aware of any malicious exploitation of these issues.

Weakness Type and Impact

CWE-200 Exposure of Sensitive Information to an Unauthorized Actor

CAPEC-118 Collect and Analyze Information

Solution

VersionMinor VersionSuggested Solution
Prisma Access Agent on Windows24.0 through 26.2Upgrade to 26.2.1 or later.
Prisma Access Agent on macOS24.0 through 26.2Upgrade to 26.2.1  or later.
Prisma Access Agent on Linux
No action needed
Prisma Access Agent on Android
No action needed
Prisma Access Agent on Chrome OS
No action needed
Prisma Access Agent on iOS
No action needed

Workarounds and Mitigations

No known workarounds exist for this issue.

Acknowledgments

Palo Alto Networks thanks our internal security research teams for discovering and reporting this issue.

CPE Applicability

Timeline

Initial publication.
© 2026 Palo Alto Networks, Inc. All rights reserved.