{"document":{"category":"csaf_vex","csaf_version":"2.1","notes":[{"category":"summary","text":"Palo Alto Networks PSIRT provided VEX document. This document is autogenerated.","title":"Chromium: Monthly Vulnerability Update (March 2026)"}],"publisher":{"category":"vendor","name":"Palo Alto Networks","namespace":"https://security.paloaltonetworks.com"},"title":"Palo Alto Networks PSIRT provided VEX document: PAN-SA-2026-0003","distribution":{"text":"Copyright © 2024 Palo Alto Networks. All rights reserved.","tlp":{"label":"CLEAR","url":"https://www.first.org/tlp/"}},"tracking":{"current_release_date":"2026-04-11T00:52:36.814Z","generator":{"date":"2026-04-11T00:52:36.814Z","engine":{"name":"Vulnogram","version":"0.1.0-dev"}},"id":"PAN-SA-2026-0003","initial_release_date":"2026-03-11T16:00:00.000Z","revision_history":[{"number":"1","date":"2026-03-11T09:00:00.000Z","summary":"Initial Publication"}],"status":"final","version":"1"}},"product_tree":{"branches":[{"name":"Palo Alto Networks","category":"vendor","branches":[{"name":"Prisma Browser","category":"product_name","branches":[{"category":"product_version_range","name":"vers:generic/Prisma Browser<145.7.9.76","product":{"name":"Palo Alto Networks Prisma Browser","product_id":"PANW-Prisma-Browser-62"}},{"category":"product_version_range","name":"vers:generic/Prisma Browser>=145.7.9.76","product":{"name":"Palo Alto Networks Prisma Browser","product_id":"PANW-Prisma-Browser-62"}}]}]}]},"vulnerabilities":[{"cve":"CVE-2026-2314","product_status":{"fixed":["PANW-Prisma-Browser-62"],"known_affected":["PANW-Prisma-Browser-62"]},"notes":[{"category":"description","text":"Heap buffer overflow in Codecs"}],"references":[{"category":"external","summary":"NVD - CVE-2026-2314","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2314"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0003","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0003"}],"threats":[{"category":"impact","description":"Heap buffer overflow in Codecs"}]},{"cve":"CVE-2026-2317","product_status":{"fixed":["PANW-Prisma-Browser-62"],"known_affected":["PANW-Prisma-Browser-62"]},"notes":[{"category":"description","text":"Inappropriate implementation in Animation"}],"references":[{"category":"external","summary":"NVD - CVE-2026-2317","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2317"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0003","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0003"}],"threats":[{"category":"impact","description":"Inappropriate implementation in Animation"}]},{"cve":"CVE-2026-2318","product_status":{"fixed":["PANW-Prisma-Browser-62"],"known_affected":["PANW-Prisma-Browser-62"]},"notes":[{"category":"description","text":"Inappropriate implementation in PictureInPicture"}],"references":[{"category":"external","summary":"NVD - CVE-2026-2318","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2318"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0003","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0003"}],"threats":[{"category":"impact","description":"Inappropriate implementation in PictureInPicture"}]},{"cve":"CVE-2026-2319","product_status":{"fixed":["PANW-Prisma-Browser-62"],"known_affected":["PANW-Prisma-Browser-62"]},"notes":[{"category":"description","text":"Race in DevTools"}],"references":[{"category":"external","summary":"NVD - CVE-2026-2319","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2319"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0003","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0003"}],"threats":[{"category":"impact","description":"Race in DevTools"}]},{"cve":"CVE-2026-2321","product_status":{"fixed":["PANW-Prisma-Browser-62"],"known_affected":["PANW-Prisma-Browser-62"]},"notes":[{"category":"description","text":"Use after free in Ozone"}],"references":[{"category":"external","summary":"NVD - CVE-2026-2321","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2321"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0003","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0003"}],"threats":[{"category":"impact","description":"Use after free in Ozone"}]},{"cve":"CVE-2026-2322","product_status":{"fixed":["PANW-Prisma-Browser-62"],"known_affected":["PANW-Prisma-Browser-62"]},"notes":[{"category":"description","text":"Inappropriate implementation in File input"}],"references":[{"category":"external","summary":"NVD - CVE-2026-2322","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2322"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0003","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0003"}],"threats":[{"category":"impact","description":"Inappropriate implementation in File input"}]},{"cve":"CVE-2026-2323","product_status":{"fixed":["PANW-Prisma-Browser-62"],"known_affected":["PANW-Prisma-Browser-62"]},"notes":[{"category":"description","text":"Inappropriate implementation in Downloads"}],"references":[{"category":"external","summary":"NVD - CVE-2026-2323","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2323"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0003","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0003"}],"threats":[{"category":"impact","description":"Inappropriate implementation in Downloads"}]},{"cve":"CVE-2026-2441","product_status":{"fixed":["PANW-Prisma-Browser-62"],"known_affected":["PANW-Prisma-Browser-62"]},"notes":[{"category":"description","text":"Use after free in CSS"}],"references":[{"category":"external","summary":"NVD - CVE-2026-2441","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2441"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0003","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0003"}],"threats":[{"category":"impact","description":"Use after free in CSS"}]}]}