CVE-2026-0245 Prisma Access Agent Information Disclosure Vulnerability
CVE-2026-0245 describes multiple information disclosure vulnerabilities in Palo Alto Networks Prisma Access Agent before version 26.2.1 on macOS and Windows, allowing a local user to access sensitive configuration data and credentials.
Palo Alto Networks has disclosed CVE-2026-0245, a set of information disclosure vulnerabilities affecting Prisma Access Agent versions prior to 26.2.1 on macOS and Windows. A local attacker with low privileges could potentially exploit these vulnerabilities to gain access to sensitive configuration data and credentials stored by the agent. The Prisma Access Agent versions running on Linux, Android, ChromeOS, and iOS are not affected. Palo Alto Networks is not aware of any malicious exploitation of these issues.
Attack Chain
- A local user gains access to a system with a vulnerable version of Prisma Access Agent installed (versions < 26.2.1 on macOS or Windows).
- The attacker leverages a low-complexity attack vector to interact with the Prisma Access Agent.
- Due to insufficient access controls or data protection mechanisms, the attacker is able to access sensitive configuration files or memory regions used by the agent.
- The attacker successfully extracts sensitive information, which may include credentials, API keys, or other configuration parameters.
- The attacker analyzes the disclosed data to identify valuable assets or potential attack vectors within the organization’s network.
- The attacker may use the stolen credentials to impersonate legitimate users or services, gaining unauthorized access to protected resources.
Impact
Successful exploitation of CVE-2026-0245 allows a local attacker to access sensitive configuration data and credentials stored by the Prisma Access Agent. This information could be used to gain unauthorized access to the organization’s network or cloud resources, potentially leading to data breaches, service disruptions, or other security incidents.
Recommendation
- Upgrade Prisma Access Agent to version 26.2.1 or later on macOS and Windows systems to remediate CVE-2026-0245.
- Monitor systems for unauthorized access to Prisma Access Agent configuration files or memory regions.
- Deploy the Sigma rule
Detect Suspicious Prisma Access Agent Configuration Accessto detect potential exploitation attempts.
Detection coverage 1
Detect Suspicious Prisma Access Agent Configuration Access
mediumDetects suspicious access to Prisma Access Agent configuration files that may indicate CVE-2026-0245 exploitation
Detection queries are available on the platform. Get full rules →