<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Prisma SD-WAN ION — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/prisma-sd-wan-ion/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 13 May 2026 16:08:49 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/prisma-sd-wan-ion/feed.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2026-0243: Prisma SD-WAN Denial-of-Service via Crafted IPv6 Packet</title><link>https://feed.craftedsignal.io/briefs/2026-05-cve-2026-0243-prisma-sdwan-dos/</link><pubDate>Wed, 13 May 2026 16:08:49 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cve-2026-0243-prisma-sdwan-dos/</guid><description>An unauthenticated, adjacent attacker can disrupt Palo Alto Networks Prisma SD-WAN ION devices by sending a specially crafted IPv6 packet, leading to a denial-of-service condition.</description><content:encoded><![CDATA[<p>A denial-of-service (DoS) vulnerability, identified as CVE-2026-0243, affects Palo Alto Networks Prisma SD-WAN ION devices. An unauthenticated attacker, positioned in a network adjacent to a vulnerable device, can exploit this flaw by transmitting a specially crafted IPv6 packet. Successful exploitation results in a system disruption, impacting availability. The vulnerability affects Prisma SD-WAN ION versions prior to 6.5.3-b15, 6.4.3-b8, and 6.3.6-b10. The device must have IPv6 enabled for the vulnerability to be exploitable. Palo Alto Networks internally discovered this issue.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a target Prisma SD-WAN ION device with IPv6 enabled.</li>
<li>Attacker crafts a malicious IPv6 packet specifically designed to trigger the DoS vulnerability.</li>
<li>Attacker transmits the crafted IPv6 packet to the target Prisma SD-WAN ION device from an adjacent network.</li>
<li>The device receives and processes the malicious IPv6 packet.</li>
<li>The processing of the crafted packet triggers excessive resource allocation or an unchecked loop condition.</li>
<li>The device&rsquo;s system resources (CPU, memory) become exhausted due to the excessive resource allocation.</li>
<li>The device becomes unresponsive and unable to process legitimate network traffic.</li>
<li>The Prisma SD-WAN ION device experiences a denial-of-service condition, disrupting network operations.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-0243 results in a denial-of-service condition on affected Prisma SD-WAN ION devices. This disruption can lead to network outages, impacting business operations that rely on the SD-WAN infrastructure. Palo Alto Networks is not aware of any malicious exploitation of this issue in the wild.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Prisma SD-WAN ION to version 6.5.3-b15, 6.4.3-b8, or 6.3.6-b10 or later to remediate CVE-2026-0243.</li>
<li>Disable IPv6 on Prisma SD-WAN ION devices if it is not required as a workaround.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious IPv6 Traffic to Prisma SD-WAN ION&rdquo; to identify potentially malicious IPv6 packets targeting Prisma SD-WAN devices.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>denial-of-service</category><category>network</category><category>Prisma SD-WAN</category></item><item><title>CVE-2026-0244 Prisma SD-WAN ION Improper Certificate Validation Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-cve-2026-0244-prisma-sdwan/</link><pubDate>Wed, 13 May 2026 16:06:20 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cve-2026-0244-prisma-sdwan/</guid><description>CVE-2026-0244 is an improper certificate validation vulnerability in Palo Alto Networks Prisma SD-WAN ION that allows a man-in-the-middle (MitM) attacker to impersonate the controller.</description><content:encoded><![CDATA[<p>CVE-2026-0244 is an improper certificate validation vulnerability affecting Palo Alto Networks Prisma SD-WAN ION devices. This vulnerability allows a man-in-the-middle (MitM) attacker to impersonate the Prisma SD-WAN controller. Specifically, Prisma SD-WAN ION versions before 6.5.3-b15, 6.4.3-b8, and 6.3.6-b10 are affected. Palo Alto Networks internally discovered this vulnerability. Successful exploitation could allow an attacker to intercept and modify communications between the SD-WAN ION device and the controller, potentially leading to unauthorized access or control of the network.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker positions themselves in a man-in-the-middle (MitM) position between a Prisma SD-WAN ION device and the controller. This could be achieved through ARP spoofing or DNS poisoning.</li>
<li>The SD-WAN ION device attempts to establish a secure connection with the controller.</li>
<li>The attacker intercepts the TLS handshake.</li>
<li>Due to the improper certificate validation, the attacker presents a fraudulent certificate to the SD-WAN ION device.</li>
<li>The SD-WAN ION device, failing to properly validate the certificate, trusts the attacker&rsquo;s certificate.</li>
<li>A secure connection is established between the SD-WAN ION device and the attacker, who is impersonating the controller.</li>
<li>The attacker intercepts and potentially modifies communications between the SD-WAN ION device and the real controller.</li>
<li>The attacker could gain unauthorized access to the network or control the SD-WAN ION device.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-0244 allows an attacker to perform man-in-the-middle attacks and impersonate the Prisma SD-WAN controller. This can lead to unauthorized access, data interception, or manipulation of network traffic. The vulnerability affects Prisma SD-WAN ION devices running versions prior to 6.5.3-b15, 6.4.3-b8, and 6.3.6-b10. While Palo Alto Networks is not aware of any malicious exploitation, the potential impact is significant, affecting confidentiality and integrity.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Prisma SD-WAN ION to version 6.5.3-b15 or later if running a version between 6.5.1 and 6.5.3, as indicated in the advisory.</li>
<li>Upgrade Prisma SD-WAN ION to version 6.4.3-b8 or later if running a version between 6.4.1 and 6.4.3, as indicated in the advisory.</li>
<li>Upgrade Prisma SD-WAN ION to version 6.3.6-b10 or later if running a version between 6.3.1 and 6.3.6, as indicated in the advisory.</li>
<li>For Prisma SD-WAN ION 6.2.4 on-prem, upgrade to version 6.2.4-b12.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>vulnerability</category><category>mitm</category><category>certificate validation</category></item></channel></rss>