<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Prisma-Access-Agent — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/prisma-access-agent/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 13 May 2026 16:08:37 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/prisma-access-agent/feed.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2026-0245 Prisma Access Agent Information Disclosure Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-prisma-access-info-disclosure/</link><pubDate>Wed, 13 May 2026 16:08:37 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-prisma-access-info-disclosure/</guid><description>CVE-2026-0245 describes multiple information disclosure vulnerabilities in Palo Alto Networks Prisma Access Agent before version 26.2.1 on macOS and Windows, allowing a local user to access sensitive configuration data and credentials.</description><content:encoded><![CDATA[<p>Palo Alto Networks has disclosed CVE-2026-0245, a set of information disclosure vulnerabilities affecting Prisma Access Agent versions prior to 26.2.1 on macOS and Windows. A local attacker with low privileges could potentially exploit these vulnerabilities to gain access to sensitive configuration data and credentials stored by the agent. The Prisma Access Agent versions running on Linux, Android, ChromeOS, and iOS are not affected. Palo Alto Networks is not aware of any malicious exploitation of these issues.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A local user gains access to a system with a vulnerable version of Prisma Access Agent installed (versions &lt; 26.2.1 on macOS or Windows).</li>
<li>The attacker leverages a low-complexity attack vector to interact with the Prisma Access Agent.</li>
<li>Due to insufficient access controls or data protection mechanisms, the attacker is able to access sensitive configuration files or memory regions used by the agent.</li>
<li>The attacker successfully extracts sensitive information, which may include credentials, API keys, or other configuration parameters.</li>
<li>The attacker analyzes the disclosed data to identify valuable assets or potential attack vectors within the organization&rsquo;s network.</li>
<li>The attacker may use the stolen credentials to impersonate legitimate users or services, gaining unauthorized access to protected resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-0245 allows a local attacker to access sensitive configuration data and credentials stored by the Prisma Access Agent. This information could be used to gain unauthorized access to the organization&rsquo;s network or cloud resources, potentially leading to data breaches, service disruptions, or other security incidents.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Prisma Access Agent to version 26.2.1 or later on macOS and Windows systems to remediate CVE-2026-0245.</li>
<li>Monitor systems for unauthorized access to Prisma Access Agent configuration files or memory regions.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious Prisma Access Agent Configuration Access</code> to detect potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cve-2026-0245</category><category>information-disclosure</category><category>prisma-access-agent</category></item></channel></rss>