Palo Alto Networks Bug Bounty Scope

The Palo Alto Networks Product Security and Incident Response Team (PSIRT) is responsible for coordination of security vulnerability reports related to Palo Alto Networks products and also for orchestrating mitigation of security vulnerabilities in our product. We are a CVE Numbering Authority (CNA) and we cover all Palo Alto Networks products. Please see our Product Security Assurance and Vulnerability Disclosure Policy for more details.

Reporting a vulnerability

We provide two ways to report security vulnerabilities in Palo alto Networks products:

Please submit your report to one of the above, ensuring you provide:

We also encourage you to submit:

If the report is not detailed enough to reproduce the issue, the issue may not be eligible for a reward.

Rewards

The amount awarded will depend on a number of factors (primarily aspects around the ultimate impact), so we are unable to preemptively share specific reward amounts. With that said, high quality reports with reliable, fully automated proof of concept code will earn higher bug bounty rewards.

Program Scope

To be eligible for a bounty, you can report a security vulnerability in a Palo Alto Networks product.

Any reports for Palo Alto Networks websites unrelated to product functionality are out of scope. Please report issues related to these websites at https://paloaltonetworks.responsibledisclosure.com.

The following types of issues are out of scope for this bug bounty program:

  1. Security feature bypasses (aka: false negatives), where no existing signature or existing feature detects a specific instance of an attack.
  2. Open source software CVEs/3rd party dependency vulnerabilities reported by scanners without demonstrated proof of exploitability.
    1. We offer support for such reports for our customers on a case-by-case basis, but they are not eligible for bounty without proof of exploitability.
    2. Please see the links below for OSS version information:
      1. https://security.paloaltonetworks.com
      2. https://docs.paloaltonetworks.com/oss-listings/pan-os-oss-listings
      3. https://docs-cortex.paloaltonetworks.com/r/Cortex-XDR/Cortex-XDR-OSS-Listings/Cortex-XDR-OSS-Listings
      4. https://docs.paloaltonetworks.com/oss-listings/globalprotect-app-oss-listings
  3. Software bugs with no security impact (as determined by section 4.1 of the CVE Numbering Authority (CNA) Operational Rules). Such bugs should be submitted to https://support.paloaltonetworks.com.
  4. Theoretical vulnerabilities that require unlikely user interaction or circumstances. For example:
    1. Vulnerabilities only affecting users of unsupported or end-of-life browsers or operating systems
    2. Broken link hijacking
    3. Tabnabbing
    4. Content spoofing and text injection issues
    5. Self-exploitation, such as self-XSS or self-DoS (unless it can be used to attack a different account)
  5. Theoretical vulnerabilities that do not demonstrate real-world security impact. For example:
    1. Weak ciphers or TLS configurations
    2. Clickjacking on pages with no sensitive actions
    3. Cross-Site Request Forgery (CSRF) on forms with no sensitive actions (e.g., logout)
    4. Permissive CORS configurations without demonstrated security impact
    5. Information disclosure that does not lead to a tangible security impact. Examples include:
      1. Software version disclosure
      2. Banner identification issues
      3. Verbose error messages (e.g., stack traces, application, or server errors)
      4. Sensitive header information
      5. Password hash disclosure (unless the password hashing algorithm is demonstrably weak and can lead to practical attacks, such as MD5 collisions)
    6. Open redirects (unless you can demonstrate a security impact)
  6. Optional security hardening steps / missing best practices. For example:
    1. SSL/TLS configurations
    2. Missing cookie flags (e.g. HttpOnly, Secure, etc.)
    3. Content-Security-Policy configuration opinions
  7. Vulnerabilities that may require hazardous testing. This type of testing must never be attempted unless explicitly authorized:
    1. Issues relating to excessive traffic/requests (e.g., DoS, DDoS)
    2. Social engineering attacks (e.g., phishing, opening support requests)
    3. Attacks that are noisy to users or admins (e.g., spamming notifications or forms)

Test Plan

Program Terms and Conditions

To be eligible for a reward under this program, you must agree to all of the following terms.

Palo Alto Networks in this agreement represents Palo Alto Networks Inc., and its subsidiaries.

© 2025 Palo Alto Networks, Inc. All rights reserved.