{"document":{"category":"csaf_vex","csaf_version":"2.1","notes":[{"category":"summary","text":"Palo Alto Networks PSIRT provided VEX document. This document is autogenerated.","title":"Informational Bulletin: Impact assessment of OSS CVEs in PAN-OS"}],"publisher":{"category":"vendor","name":"Palo Alto Networks","namespace":"https://security.paloaltonetworks.com"},"title":"Palo Alto Networks PSIRT provided VEX document: PAN-SA-2026-0006","distribution":{"text":"Copyright © 2024 Palo Alto Networks. All rights reserved.","tlp":{"label":"CLEAR","url":"https://www.first.org/tlp/"}},"tracking":{"current_release_date":"2026-04-08T18:14:04.654Z","generator":{"date":"2026-04-08T18:14:04.654Z","engine":{"name":"Vulnogram","version":"0.1.0-dev"}},"id":"PAN-SA-2026-0006","initial_release_date":"2026-04-08T16:00:00.000Z","revision_history":[{"number":"1","date":"2026-04-08T09:00:00.000Z","summary":"Initial Publication"}],"status":"final","version":"1"}},"product_tree":{"branches":[{"name":"Palo Alto Networks","category":"vendor","branches":[{"name":"PAN-OS","category":"product_name","branches":[{"category":"product_version","name":"PAN-OS All","product":{"name":"Palo Alto Networks PAN-OS","product_id":"PANW-PAN-OS-1"}}]}]}]},"vulnerabilities":[{"cve":"CVE-2023-2176","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as PAN-OS does not use RDMA."}],"references":[{"category":"external","summary":"NVD - CVE-2023-2176","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-2176"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0006","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0006"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as PAN-OS does not use RDMA."}]},{"cve":"CVE-2023-5633","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as PAN-OS as the prerequisite conditions needed to be vulnerable do not exists in PAN-OS."}],"references":[{"category":"external","summary":"NVD - CVE-2023-5633","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-5633"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0006","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0006"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as PAN-OS as the prerequisite conditions needed to be vulnerable do not exists in PAN-OS."}]},{"cve":"CVE-2023-28464","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as PAN-OS does not use the Bluetooth subsystem."}],"references":[{"category":"external","summary":"NVD - CVE-2023-28464","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-28464"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0006","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0006"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as PAN-OS does not use the Bluetooth subsystem."}]},{"cve":"CVE-2024-0646","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as PAN-OS does not use the function splice() with a ktls socket as the destination."}],"references":[{"category":"external","summary":"NVD - CVE-2024-0646","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-0646"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0006","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0006"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as PAN-OS does not use the function splice() with a ktls socket as the destination."}]},{"cve":"CVE-2024-36971","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as PAN-OS does not use the vulnerable function __dst_negative_advice()."}],"references":[{"category":"external","summary":"NVD - CVE-2024-36971","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-36971"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0006","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0006"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as PAN-OS does not use the vulnerable function __dst_negative_advice()."}]},{"cve":"CVE-2024-36886","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as PAN-OS does not use the vulnerable function  tipc_buf_append()."}],"references":[{"category":"external","summary":"NVD - CVE-2024-36886","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-36886"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0006","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0006"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as PAN-OS does not use the vulnerable function  tipc_buf_append()."}]},{"cve":"CVE-2025-57052","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"This CVE does not affect PAN-OS as PAN-OS does not have the vulnerable cjson library."}],"references":[{"category":"external","summary":"NVD - CVE-2025-57052","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-57052"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2026-0006","url":"https://security.paloaltonetworks.com/PAN-SA-2026-0006"}],"threats":[{"category":"impact","description":"This CVE does not affect PAN-OS as PAN-OS does not have the vulnerable cjson library."}]}]}