<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-0248 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-0248/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 13 May 2026 16:02:25 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-0248/feed.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2026-0248 Prisma Access Agent Improper Certificate Validation Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-prisma-access-mitm/</link><pubDate>Wed, 13 May 2026 16:02:25 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-prisma-access-mitm/</guid><description>CVE-2026-0248 is an improper certificate validation vulnerability in Prisma Access Agent for Android and Chrome OS, enabling a man-in-the-middle (MitM) attack to intercept VPN traffic and capture sensitive device information by presenting a certificate issued by a trusted Certificate Authority.</description><content:encoded><![CDATA[<p>CVE-2026-0248 is an improper certificate validation vulnerability affecting Palo Alto Networks Prisma Access Agent versions prior to 26.2.1 on Android and Chrome OS. An attacker can exploit this vulnerability by performing a man-in-the-middle (MitM) attack. By presenting a certificate for any domain issued by a trusted Certificate Authority, the attacker can intercept VPN traffic and capture sensitive device information. This vulnerability does not affect the Prisma Access Agent on macOS, Windows, Linux, or iOS. Palo Alto Networks discovered this issue internally.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker positions themselves in a network path between the Android/Chrome OS device and the VPN server.</li>
<li>The user initiates a VPN connection via the Prisma Access Agent.</li>
<li>The attacker intercepts the initial TLS handshake.</li>
<li>The attacker presents a fraudulent certificate for a domain issued by a trusted Certificate Authority.</li>
<li>Due to the improper certificate validation, the Prisma Access Agent on the Android/Chrome OS device accepts the fraudulent certificate.</li>
<li>A secure channel is established between the device and the attacker, appearing as a legitimate VPN connection.</li>
<li>All VPN traffic is now routed through the attacker&rsquo;s machine, allowing the attacker to inspect and modify data in transit.</li>
<li>The attacker captures sensitive device information transmitted through the VPN connection.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-0248 allows an attacker to perform a man-in-the-middle attack on VPN connections established by the Prisma Access Agent on affected Android and Chrome OS devices. This can lead to the disclosure of sensitive information, such as credentials, personal data, or proprietary business data, transmitted through the VPN. The severity is rated as medium due to the adjacent attack vector.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Prisma Access Agent on Android and Chrome OS devices to version 26.2.1 or later to remediate CVE-2026-0248.</li>
<li>Deploy the Sigma rules below to detect potential man-in-the-middle attacks targeting Prisma Access Agent connections.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cve-2026-0248</category><category>mitm</category><category>vpn</category><category>certificate-validation</category></item></channel></rss>