Search criteria

2 vulnerabilities found for Broker VM by Palo Alto Networks

CVE-2026-0238 (GCVE-0-2026-0238)

Vulnerability from nvd – Published: 2026-05-13 18:22 – Updated: 2026-05-13 18:55
VLAI?
Title
Broker VM: Improper Input Validation in Broker VM Certificate and Key Fields
Summary
A vulnerability in Palo Alto Networks Broker VM allows an authenticated administrator to inject arbitrary content into certain Broker VM fields.
CWE
  • CWE-20 - Improper Input Validation
Assigner
References
Impacted products
Vendor Product Version
Palo Alto Networks Broker VM Affected: 30.0 , < 30.0.24 (custom)
Create a notification for this product.
Date Public ?
2026-05-13 16:00
Credits
This issue was discovered during an internal penetration test.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2026-0238",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-05-13T18:55:00.471145Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-05-13T18:55:30.943Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Broker VM",
          "vendor": "Palo Alto Networks",
          "versions": [
            {
              "changes": [
                {
                  "at": "30.0.24",
                  "status": "unaffected"
                }
              ],
              "lessThan": "30.0.24",
              "status": "affected",
              "version": "30.0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "configurations": [
        {
          "lang": "eng",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eNo special configuration is required to be affected by this issue.\u003c/p\u003e"
            }
          ],
          "value": "No special configuration is required to be affected by this issue."
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:a:palo_alto_networks:broker_vm:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "30.0.24",
                  "versionStartIncluding": "30.0.0",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ],
          "operator": "OR"
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "other",
          "value": "This issue was discovered during an internal penetration test."
        }
      ],
      "datePublic": "2026-05-13T16:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eA vulnerability in Palo Alto Networks Broker VM allows an authenticated administrator to inject arbitrary content into certain Broker VM fields.\u003c/p\u003e"
            }
          ],
          "value": "A vulnerability in Palo Alto Networks Broker VM allows an authenticated administrator to inject arbitrary content into certain Broker VM fields."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003ePalo Alto Networks is not aware of any malicious exploitation of this issue.\u003c/p\u003e"
            }
          ],
          "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-153",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-153 Input Data Manipulation"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NO",
            "Recovery": "USER",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "LOCAL",
            "baseScore": 1.1,
            "baseSeverity": "LOW",
            "exploitMaturity": "UNREPORTED",
            "privilegesRequired": "LOW",
            "providerUrgency": "AMBER",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "LOW",
            "userInteraction": "NONE",
            "valueDensity": "DIFFUSE",
            "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:U/AU:N/R:U/V:D/RE:M/U:Amber",
            "version": "4.0",
            "vulnAvailabilityImpact": "NONE",
            "vulnConfidentialityImpact": "NONE",
            "vulnIntegrityImpact": "LOW",
            "vulnerabilityResponseEffort": "MODERATE"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "CWE-20 Improper Input Validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-05-13T18:22:00.405Z",
        "orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0",
        "shortName": "palo_alto"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://security.paloaltonetworks.com/CVE-2026-0238"
        }
      ],
      "solutions": [
        {
          "lang": "eng",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003ctable class=\"tbl\"\u003e\u003cthead\u003e\u003ctr\u003e\u003cth\u003eVersion\u003c/th\u003e\u003cth\u003eMinor Version\u003c/th\u003e\u003cth\u003eSuggested Solution\u003c/th\u003e\u003c/tr\u003e\u003c/thead\u003e\u003ctbody\u003e\u003ctr\u003e\u003ctd\u003eBroker VM 30.0\u003c/td\u003e\u003ctd\u003e 30.0.24 or earlier\u003c/td\u003e\u003ctd\u003eUpgrade to\u0026nbsp; 30.0.24 or later.\u003c/td\u003e\u003c/tr\u003e\u003c/tbody\u003e\u003c/table\u003e"
            }
          ],
          "value": "Version          Minor Version        Suggested Solution\nBroker VM 30.0   30.0.24 or earlier   Upgrade to  30.0.24 or later."
        }
      ],
      "source": {
        "discovery": "INTERNAL"
      },
      "timeline": [
        {
          "lang": "en",
          "time": "2026-05-13T16:00:00.000Z",
          "value": "Initial Publication."
        }
      ],
      "title": "Broker VM: Improper Input Validation in Broker VM Certificate and Key Fields",
      "workarounds": [
        {
          "lang": "eng",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eNo known workarounds exist for this issue.\u003c/p\u003e"
            }
          ],
          "value": "No known workarounds exist for this issue."
        }
      ],
      "x_affectedList": [
        "Cortex XDR 30.0.0",
        "Cortex XDR 30.0.1",
        "Cortex XDR 30.0.2",
        "Cortex XDR 30.0.3",
        "Cortex XDR 30.0.4",
        "Cortex XDR 30.0.5",
        "Cortex XDR 30.0.6",
        "Cortex XDR 30.0.7",
        "Cortex XDR 30.0.8",
        "Cortex XDR 30.0.9",
        "Cortex XDR 30.0.10",
        "Cortex XDR 30.0.11",
        "Cortex XDR 30.0.12",
        "Cortex XDR 30.0.13",
        "Cortex XDR 30.0.14",
        "Cortex XDR 30.0.15",
        "Cortex XDR 30.0.16",
        "Cortex XDR 30.0.17",
        "Cortex XDR 30.0.18",
        "Cortex XDR 30.0.19",
        "Cortex XDR 30.0.20",
        "Cortex XDR 30.0.21",
        "Cortex XDR 30.0.22",
        "Cortex XDR 30.0.23",
        "Cortex XDR 30.0.24",
        "Cortex XDR 30.0.25",
        "Cortex XDR 30.0.26",
        "Cortex XDR 30.0.27",
        "Cortex XDR 30.0.28",
        "Cortex XDR 30.0.29",
        "Cortex XDR 30.0.30",
        "Cortex XDR 30.0.31",
        "Cortex XDR 30.0.32",
        "Cortex XDR 30.0.33",
        "Cortex XDR 30.0.34",
        "Cortex XDR 30.0.35",
        "Cortex XDR 30.0.36",
        "Cortex XDR 30.0.37",
        "Cortex XDR 30.0.38",
        "Cortex XDR 30.0.39",
        "Cortex XDR 30.0.40",
        "Cortex XDR 30.0.41",
        "Cortex XDR 30.0.42",
        "Cortex XDR 30.0.43",
        "Cortex XDR 30.0.44",
        "Cortex XDR 30.0.45",
        "Cortex XDR 30.0.46",
        "Cortex XDR 30.0.47",
        "Cortex XDR 30.0.48",
        "Cortex XDR 30.0.49",
        "Cortex XDR 30.0.50",
        "Cortex XDR 30.0.51"
      ],
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0",
    "assignerShortName": "palo_alto",
    "cveId": "CVE-2026-0238",
    "datePublished": "2026-05-13T18:22:00.405Z",
    "dateReserved": "2025-11-03T20:43:59.121Z",
    "dateUpdated": "2026-05-13T18:55:30.943Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2026-0238 (GCVE-0-2026-0238)

Vulnerability from cvelistv5 – Published: 2026-05-13 18:22 – Updated: 2026-05-13 18:55
VLAI?
Title
Broker VM: Improper Input Validation in Broker VM Certificate and Key Fields
Summary
A vulnerability in Palo Alto Networks Broker VM allows an authenticated administrator to inject arbitrary content into certain Broker VM fields.
CWE
  • CWE-20 - Improper Input Validation
Assigner
References
Impacted products
Vendor Product Version
Palo Alto Networks Broker VM Affected: 30.0 , < 30.0.24 (custom)
Create a notification for this product.
Date Public ?
2026-05-13 16:00
Credits
This issue was discovered during an internal penetration test.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2026-0238",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-05-13T18:55:00.471145Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-05-13T18:55:30.943Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Broker VM",
          "vendor": "Palo Alto Networks",
          "versions": [
            {
              "changes": [
                {
                  "at": "30.0.24",
                  "status": "unaffected"
                }
              ],
              "lessThan": "30.0.24",
              "status": "affected",
              "version": "30.0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "configurations": [
        {
          "lang": "eng",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eNo special configuration is required to be affected by this issue.\u003c/p\u003e"
            }
          ],
          "value": "No special configuration is required to be affected by this issue."
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:a:palo_alto_networks:broker_vm:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "30.0.24",
                  "versionStartIncluding": "30.0.0",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ],
          "operator": "OR"
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "other",
          "value": "This issue was discovered during an internal penetration test."
        }
      ],
      "datePublic": "2026-05-13T16:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eA vulnerability in Palo Alto Networks Broker VM allows an authenticated administrator to inject arbitrary content into certain Broker VM fields.\u003c/p\u003e"
            }
          ],
          "value": "A vulnerability in Palo Alto Networks Broker VM allows an authenticated administrator to inject arbitrary content into certain Broker VM fields."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003ePalo Alto Networks is not aware of any malicious exploitation of this issue.\u003c/p\u003e"
            }
          ],
          "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-153",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-153 Input Data Manipulation"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NO",
            "Recovery": "USER",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "LOCAL",
            "baseScore": 1.1,
            "baseSeverity": "LOW",
            "exploitMaturity": "UNREPORTED",
            "privilegesRequired": "LOW",
            "providerUrgency": "AMBER",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "LOW",
            "userInteraction": "NONE",
            "valueDensity": "DIFFUSE",
            "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:U/AU:N/R:U/V:D/RE:M/U:Amber",
            "version": "4.0",
            "vulnAvailabilityImpact": "NONE",
            "vulnConfidentialityImpact": "NONE",
            "vulnIntegrityImpact": "LOW",
            "vulnerabilityResponseEffort": "MODERATE"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "CWE-20 Improper Input Validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-05-13T18:22:00.405Z",
        "orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0",
        "shortName": "palo_alto"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://security.paloaltonetworks.com/CVE-2026-0238"
        }
      ],
      "solutions": [
        {
          "lang": "eng",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003ctable class=\"tbl\"\u003e\u003cthead\u003e\u003ctr\u003e\u003cth\u003eVersion\u003c/th\u003e\u003cth\u003eMinor Version\u003c/th\u003e\u003cth\u003eSuggested Solution\u003c/th\u003e\u003c/tr\u003e\u003c/thead\u003e\u003ctbody\u003e\u003ctr\u003e\u003ctd\u003eBroker VM 30.0\u003c/td\u003e\u003ctd\u003e 30.0.24 or earlier\u003c/td\u003e\u003ctd\u003eUpgrade to\u0026nbsp; 30.0.24 or later.\u003c/td\u003e\u003c/tr\u003e\u003c/tbody\u003e\u003c/table\u003e"
            }
          ],
          "value": "Version          Minor Version        Suggested Solution\nBroker VM 30.0   30.0.24 or earlier   Upgrade to  30.0.24 or later."
        }
      ],
      "source": {
        "discovery": "INTERNAL"
      },
      "timeline": [
        {
          "lang": "en",
          "time": "2026-05-13T16:00:00.000Z",
          "value": "Initial Publication."
        }
      ],
      "title": "Broker VM: Improper Input Validation in Broker VM Certificate and Key Fields",
      "workarounds": [
        {
          "lang": "eng",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eNo known workarounds exist for this issue.\u003c/p\u003e"
            }
          ],
          "value": "No known workarounds exist for this issue."
        }
      ],
      "x_affectedList": [
        "Cortex XDR 30.0.0",
        "Cortex XDR 30.0.1",
        "Cortex XDR 30.0.2",
        "Cortex XDR 30.0.3",
        "Cortex XDR 30.0.4",
        "Cortex XDR 30.0.5",
        "Cortex XDR 30.0.6",
        "Cortex XDR 30.0.7",
        "Cortex XDR 30.0.8",
        "Cortex XDR 30.0.9",
        "Cortex XDR 30.0.10",
        "Cortex XDR 30.0.11",
        "Cortex XDR 30.0.12",
        "Cortex XDR 30.0.13",
        "Cortex XDR 30.0.14",
        "Cortex XDR 30.0.15",
        "Cortex XDR 30.0.16",
        "Cortex XDR 30.0.17",
        "Cortex XDR 30.0.18",
        "Cortex XDR 30.0.19",
        "Cortex XDR 30.0.20",
        "Cortex XDR 30.0.21",
        "Cortex XDR 30.0.22",
        "Cortex XDR 30.0.23",
        "Cortex XDR 30.0.24",
        "Cortex XDR 30.0.25",
        "Cortex XDR 30.0.26",
        "Cortex XDR 30.0.27",
        "Cortex XDR 30.0.28",
        "Cortex XDR 30.0.29",
        "Cortex XDR 30.0.30",
        "Cortex XDR 30.0.31",
        "Cortex XDR 30.0.32",
        "Cortex XDR 30.0.33",
        "Cortex XDR 30.0.34",
        "Cortex XDR 30.0.35",
        "Cortex XDR 30.0.36",
        "Cortex XDR 30.0.37",
        "Cortex XDR 30.0.38",
        "Cortex XDR 30.0.39",
        "Cortex XDR 30.0.40",
        "Cortex XDR 30.0.41",
        "Cortex XDR 30.0.42",
        "Cortex XDR 30.0.43",
        "Cortex XDR 30.0.44",
        "Cortex XDR 30.0.45",
        "Cortex XDR 30.0.46",
        "Cortex XDR 30.0.47",
        "Cortex XDR 30.0.48",
        "Cortex XDR 30.0.49",
        "Cortex XDR 30.0.50",
        "Cortex XDR 30.0.51"
      ],
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0",
    "assignerShortName": "palo_alto",
    "cveId": "CVE-2026-0238",
    "datePublished": "2026-05-13T18:22:00.405Z",
    "dateReserved": "2025-11-03T20:43:59.121Z",
    "dateUpdated": "2026-05-13T18:55:30.943Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}