CERTFR-2026-AVI-0596

Vulnerability from certfr_avis - Published: 2026-05-15 - Updated: 2026-05-15

De multiples vulnérabilités ont été découvertes dans les produits Palo Alto Networks. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

L'éditeur indique que des correctifs seront publiés le 28 mai 2026.

Impacted products
Vendor Product Description
Palo Alto Networks N/A WildFire WF-500 et WF-500-B versions 12.1.4 antérieures à 12.1.4-h5
Palo Alto Networks GlobalProtect App GlobalProtect App versions 6.0.x antérieures à 6.0.14 pour Android et ChromeOS
Palo Alto Networks Prisma Access Browser Prisma Access versions 10.2.x antérieures à 10.2.10-h36
Palo Alto Networks PAN-OS PAN-OS versions 11.2.12
Palo Alto Networks N/A Prisma SD-WAN ION versions 6.3.x antérieures à 6.3.6-b10
Palo Alto Networks N/A WildFire WF-500 et WF-500-B versions 11.1.13 antérieures à 11.1.13-h5
Palo Alto Networks GlobalProtect App GlobalProtect App versions 6.0.x antérieures à 6.0.11 pour Linux
Palo Alto Networks N/A WildFire WF-500 et WF-500-B versions 11.2.10 antérieures à 11.2.10-h6
Palo Alto Networks GlobalProtect App GlobalProtect App versions 6.1.x antérieures à 6.1.13 pour Android et ChomeOS
Palo Alto Networks PAN-OS PAN-OS versions 11.2.7 antérieures à 11.2.7-h14
Palo Alto Networks Prisma Access Browser Prisma Access Agent versions 25.x et 26.x antérieures à 26.2.1 pour Android et ChromeOS
Palo Alto Networks N/A WildFire WF-500 et WF-500-B versions 10.2.7 antérieures à 10.2.7-h34
Palo Alto Networks PAN-OS PAN-OS versions 11.2.4 antérieures à 11.2.4-h17
Palo Alto Networks N/A WildFire WF-500 et WF-500-B versions 11.1.6 antérieures à 11.1.6-h32
Palo Alto Networks N/A Prisma SD-WAN ION versions 6.5.x antérieures à 6.5.3-b15
Palo Alto Networks N/A WildFire WF-500 et WF-500-B versions 10.2.13 antérieures à 10.2.13-h21
Palo Alto Networks PAN-OS PAN-OS versions 11.1.15
Palo Alto Networks N/A Prisma SD-WAN ION versions 6.4.x antérieures à 6.4.3-b8
Palo Alto Networks PAN-OS PAN-OS versions 10.2.7 antérieures à 10.2.7-h34
Palo Alto Networks N/A Chronosphere Chronocollector versions antérieures à v0.116.0
Palo Alto Networks PAN-OS PAN-OS versions 12.1.7
Palo Alto Networks N/A Broker VM versions 30.0.x antérieures à 30.0.24
Palo Alto Networks N/A WildFire WF-500 et WF-500-B versions 11.1.7 antérieures à 11.1.7-h6
Palo Alto Networks N/A WildFire WF-500 et WF-500-B versions 11.1.10 antérieures à 11.1.10-h25
Palo Alto Networks N/A Trust Protection Foundation versions 24.1.x antérieures à 24.1.13
Palo Alto Networks PAN-OS PAN-OS versions 11.1.10 antérieures à 11.1.10-h25
Palo Alto Networks N/A WildFire WF-500 et WF-500-B versions 11.2.12
Palo Alto Networks PAN-OS PAN-OS versions 11.2.10 antérieures à 11.2.10-h7
Palo Alto Networks GlobalProtect App GlobalProtect App versions 6.0.x antérieures à 6.0.13 pour macOS et Windows
Palo Alto Networks PAN-OS PAN-OS versions 10.2.16 antérieures à 10.2.16-h7
Palo Alto Networks PAN-OS PAN-OS versions 11.1.7 antérieures à 11.1.7-h6
Palo Alto Networks PAN-OS PAN-OS versions 12.1.4 antérieures à 12.1.4-h5
Palo Alto Networks Prisma Access Browser Prisma Browser versions antérieures à 148.6.3.96
Palo Alto Networks N/A Trust Protection Foundation versions 24.3.x antérieures à 24.3.6
Palo Alto Networks N/A WildFire WF-500 et WF-500-B versions 11.1.4 antérieures à 11.1.4-h33
Palo Alto Networks PAN-OS PAN-OS versions 11.1.4 antérieures à 11.1.4-h33
Palo Alto Networks N/A WildFire WF-500 et WF-500-B versions 10.2.10 antérieures à 10.2.10-h36
Palo Alto Networks N/A WildFire WF-500 et WF-500-B versions 10.2.18 antérieures à 10.2.18-h6
Palo Alto Networks N/A Trust Protection Foundation versions 25.3.x antérieures à 25.3.3
Palo Alto Networks PAN-OS PAN-OS versions 12.1.4 antérieures à 12.1.4-h6
Palo Alto Networks PAN-OS PAN-OS versions 11.2.10 antérieures à 11.2.10-h6
Palo Alto Networks Prisma Access Browser Prisma Access Agent (Endpoint DLP) versions 25.x à 26.x antérieures à 26.2.1 pour Windows et macOS
Palo Alto Networks PAN-OS PAN-OS versions 10.2.18 antérieures à 10.2.18-h6
Palo Alto Networks Prisma Access Browser Prisma Access versions 11.2.x antérieures à 11.2.7-h13
Palo Alto Networks N/A WildFire WF-500 et WF-500-B versions 10.2.16 antérieures à 10.2.16-h7
Palo Alto Networks GlobalProtect App GlobalProtect App versions 6.3.x antérieures à 6.3.3-h2 pour Linux
Palo Alto Networks N/A GlobalProtect UWP App versions 6.3 antérieures à 6.3.3-h10
Palo Alto Networks N/A WildFire WF-500 et WF-500-B versions 11.1.15
Palo Alto Networks GlobalProtect App GlobalProtect App versions 6.3.x antérieures à 6.3.3-h10 pour Windows et macOS
Palo Alto Networks N/A WildFire WF-500 et WF-500-B versions 11.2.7 antérieures à 11.2.7-h13
Palo Alto Networks GlobalProtect App GlobalProtect App versions 6.2.x antérieures à 6.2.8-h10 (6.2.8-948)
Palo Alto Networks N/A WildFire WF-500 et WF-500-B versions 11.2.4 antérieures à 11.2.4-h17
Palo Alto Networks PAN-OS PAN-OS versions 11.1.6 antérieures à 11.1.6-h32
Palo Alto Networks PAN-OS PAN-OS versions 11.1.13 antérieures à 11.1.13-h5
Palo Alto Networks PAN-OS PAN-OS versions 10.2.10 antérieures à 10.2.10-h36
Palo Alto Networks PAN-OS PAN-OS versions 11.2.7 antérieures à 11.2.7-h13
Palo Alto Networks N/A WildFire WF-500 et WF-500-B versions 12.1.7
Palo Alto Networks N/A Trust Protection Foundation versions 25.1.x antérieures à 25.1.8
Palo Alto Networks PAN-OS PAN-OS versions 10.2.13 antérieures à 10.2.13-h21
References
Bulletin de sécurité Palo Alto Networks CVE-2026-0242 2026-05-13 vendor-advisory
Bulletin de sécurité Palo Alto Networks CVE-2026-0251 2026-05-13 vendor-advisory
Bulletin de sécurité Palo Alto Networks CVE-2026-0238 2026-05-13 vendor-advisory
Bulletin de sécurité Palo Alto Networks CVE-2026-0263 2026-05-13 vendor-advisory
Bulletin de sécurité Palo Alto Networks CVE-2026-0259 2026-05-13 vendor-advisory
Bulletin de sécurité Palo Alto Networks CVE-2026-0257 2026-05-13 vendor-advisory
Bulletin de sécurité Palo Alto Networks CVE-2026-0262 2026-05-13 vendor-advisory
Bulletin de sécurité Palo Alto Networks CVE-2026-0243 2026-05-13 vendor-advisory
Bulletin de sécurité Palo Alto Networks CVE-2026-0247 2026-05-13 vendor-advisory
Bulletin de sécurité Palo Alto Networks CVE-2026-0261 2026-05-13 vendor-advisory
Bulletin de sécurité Palo Alto Networks CVE-2026-0240 2026-05-13 vendor-advisory
Bulletin de sécurité Palo Alto Networks CVE-2026-0239 2026-05-13 vendor-advisory
Bulletin de sécurité Palo Alto Networks CVE-2026-0248 2026-05-13 vendor-advisory
Bulletin de sécurité Palo Alto Networks CVE-2026-0246 2026-05-13 vendor-advisory
Bulletin de sécurité Palo Alto Networks PAN-SA-2026-0007 2026-05-13 vendor-advisory
Bulletin de sécurité Palo Alto Networks CVE-2026-0265 2026-05-13 vendor-advisory
Bulletin de sécurité Palo Alto Networks CVE-2026-0250 2026-05-13 vendor-advisory
Bulletin de sécurité Palo Alto Networks CVE-2026-0264 2026-05-13 vendor-advisory
Bulletin de sécurité Palo Alto Networks CVE-2026-0256 2026-05-13 vendor-advisory
Bulletin de sécurité Palo Alto Networks CVE-2026-0241 2026-05-13 vendor-advisory
Bulletin de sécurité Palo Alto Networks CVE-2026-0245 2026-05-13 vendor-advisory
Bulletin de sécurité Palo Alto Networks CVE-2026-0258 2026-05-13 vendor-advisory
Bulletin de sécurité Palo Alto Networks CVE-2026-0249 2026-05-13 vendor-advisory
Bulletin de sécurité Palo Alto Networks CVE-2026-0244 2026-05-13 vendor-advisory

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "WildFire WF-500 et WF-500-B versions 12.1.4 ant\u00e9rieures \u00e0 12.1.4-h5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Palo Alto Networks",
          "scada": false
        }
      }
    },
    {
      "description": "GlobalProtect App versions 6.0.x ant\u00e9rieures \u00e0 6.0.14 pour Android et ChromeOS",
      "product": {
        "name": "GlobalProtect App",
        "vendor": {
          "name": "Palo Alto Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Prisma Access versions 10.2.x ant\u00e9rieures \u00e0 10.2.10-h36",
      "product": {
        "name": "Prisma Access Browser",
        "vendor": {
          "name": "Palo Alto Networks",
          "scada": false
        }
      }
    },
    {
      "description": "PAN-OS versions 11.2.12",
      "product": {
        "name": "PAN-OS",
        "vendor": {
          "name": "Palo Alto Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Prisma SD-WAN ION versions 6.3.x ant\u00e9rieures \u00e0 6.3.6-b10",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Palo Alto Networks",
          "scada": false
        }
      }
    },
    {
      "description": "WildFire WF-500 et WF-500-B versions 11.1.13 ant\u00e9rieures \u00e0 11.1.13-h5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Palo Alto Networks",
          "scada": false
        }
      }
    },
    {
      "description": "GlobalProtect App versions 6.0.x ant\u00e9rieures \u00e0 6.0.11 pour Linux",
      "product": {
        "name": "GlobalProtect App",
        "vendor": {
          "name": "Palo Alto Networks",
          "scada": false
        }
      }
    },
    {
      "description": "WildFire WF-500 et WF-500-B versions 11.2.10 ant\u00e9rieures \u00e0 11.2.10-h6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Palo Alto Networks",
          "scada": false
        }
      }
    },
    {
      "description": "GlobalProtect App versions 6.1.x ant\u00e9rieures \u00e0 6.1.13 pour Android et ChomeOS",
      "product": {
        "name": "GlobalProtect App",
        "vendor": {
          "name": "Palo Alto Networks",
          "scada": false
        }
      }
    },
    {
      "description": "PAN-OS versions 11.2.7 ant\u00e9rieures \u00e0 11.2.7-h14",
      "product": {
        "name": "PAN-OS",
        "vendor": {
          "name": "Palo Alto Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Prisma Access Agent versions 25.x et 26.x ant\u00e9rieures \u00e0 26.2.1 pour Android et ChromeOS",
      "product": {
        "name": "Prisma Access Browser",
        "vendor": {
          "name": "Palo Alto Networks",
          "scada": false
        }
      }
    },
    {
      "description": "WildFire WF-500 et WF-500-B versions 10.2.7 ant\u00e9rieures \u00e0 10.2.7-h34",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Palo Alto Networks",
          "scada": false
        }
      }
    },
    {
      "description": "PAN-OS versions 11.2.4 ant\u00e9rieures \u00e0 11.2.4-h17",
      "product": {
        "name": "PAN-OS",
        "vendor": {
          "name": "Palo Alto Networks",
          "scada": false
        }
      }
    },
    {
      "description": "WildFire WF-500 et WF-500-B versions 11.1.6 ant\u00e9rieures \u00e0 11.1.6-h32",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Palo Alto Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Prisma SD-WAN ION versions 6.5.x ant\u00e9rieures \u00e0 6.5.3-b15",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Palo Alto Networks",
          "scada": false
        }
      }
    },
    {
      "description": "WildFire WF-500 et WF-500-B versions 10.2.13 ant\u00e9rieures \u00e0 10.2.13-h21",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Palo Alto Networks",
          "scada": false
        }
      }
    },
    {
      "description": "PAN-OS versions 11.1.15",
      "product": {
        "name": "PAN-OS",
        "vendor": {
          "name": "Palo Alto Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Prisma SD-WAN ION versions 6.4.x ant\u00e9rieures \u00e0 6.4.3-b8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Palo Alto Networks",
          "scada": false
        }
      }
    },
    {
      "description": "PAN-OS versions 10.2.7 ant\u00e9rieures \u00e0 10.2.7-h34",
      "product": {
        "name": "PAN-OS",
        "vendor": {
          "name": "Palo Alto Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Chronosphere Chronocollector  versions ant\u00e9rieures \u00e0 v0.116.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Palo Alto Networks",
          "scada": false
        }
      }
    },
    {
      "description": "PAN-OS versions 12.1.7",
      "product": {
        "name": "PAN-OS",
        "vendor": {
          "name": "Palo Alto Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Broker VM versions 30.0.x ant\u00e9rieures \u00e0 30.0.24",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Palo Alto Networks",
          "scada": false
        }
      }
    },
    {
      "description": "WildFire WF-500 et WF-500-B versions 11.1.7 ant\u00e9rieures \u00e0 11.1.7-h6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Palo Alto Networks",
          "scada": false
        }
      }
    },
    {
      "description": "WildFire WF-500 et WF-500-B versions 11.1.10 ant\u00e9rieures \u00e0 11.1.10-h25",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Palo Alto Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Trust Protection Foundation versions 24.1.x ant\u00e9rieures \u00e0 24.1.13",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Palo Alto Networks",
          "scada": false
        }
      }
    },
    {
      "description": "PAN-OS versions 11.1.10 ant\u00e9rieures \u00e0 11.1.10-h25",
      "product": {
        "name": "PAN-OS",
        "vendor": {
          "name": "Palo Alto Networks",
          "scada": false
        }
      }
    },
    {
      "description": "WildFire WF-500 et WF-500-B versions 11.2.12",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Palo Alto Networks",
          "scada": false
        }
      }
    },
    {
      "description": "PAN-OS versions 11.2.10 ant\u00e9rieures \u00e0 11.2.10-h7",
      "product": {
        "name": "PAN-OS",
        "vendor": {
          "name": "Palo Alto Networks",
          "scada": false
        }
      }
    },
    {
      "description": "GlobalProtect App versions 6.0.x ant\u00e9rieures \u00e0 6.0.13 pour macOS et Windows",
      "product": {
        "name": "GlobalProtect App",
        "vendor": {
          "name": "Palo Alto Networks",
          "scada": false
        }
      }
    },
    {
      "description": "PAN-OS versions 10.2.16 ant\u00e9rieures \u00e0 10.2.16-h7",
      "product": {
        "name": "PAN-OS",
        "vendor": {
          "name": "Palo Alto Networks",
          "scada": false
        }
      }
    },
    {
      "description": "PAN-OS versions 11.1.7 ant\u00e9rieures \u00e0 11.1.7-h6",
      "product": {
        "name": "PAN-OS",
        "vendor": {
          "name": "Palo Alto Networks",
          "scada": false
        }
      }
    },
    {
      "description": "PAN-OS versions 12.1.4 ant\u00e9rieures \u00e0 12.1.4-h5",
      "product": {
        "name": "PAN-OS",
        "vendor": {
          "name": "Palo Alto Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Prisma Browser versions ant\u00e9rieures \u00e0 148.6.3.96",
      "product": {
        "name": "Prisma Access Browser",
        "vendor": {
          "name": "Palo Alto Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Trust Protection Foundation versions 24.3.x ant\u00e9rieures \u00e0 24.3.6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Palo Alto Networks",
          "scada": false
        }
      }
    },
    {
      "description": "WildFire WF-500 et WF-500-B versions 11.1.4 ant\u00e9rieures \u00e0 11.1.4-h33",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Palo Alto Networks",
          "scada": false
        }
      }
    },
    {
      "description": "PAN-OS versions 11.1.4 ant\u00e9rieures \u00e0 11.1.4-h33",
      "product": {
        "name": "PAN-OS",
        "vendor": {
          "name": "Palo Alto Networks",
          "scada": false
        }
      }
    },
    {
      "description": "WildFire WF-500 et WF-500-B versions 10.2.10 ant\u00e9rieures \u00e0 10.2.10-h36",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Palo Alto Networks",
          "scada": false
        }
      }
    },
    {
      "description": "WildFire WF-500 et WF-500-B versions 10.2.18 ant\u00e9rieures \u00e0 10.2.18-h6",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Palo Alto Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Trust Protection Foundation versions 25.3.x ant\u00e9rieures \u00e0 25.3.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Palo Alto Networks",
          "scada": false
        }
      }
    },
    {
      "description": "PAN-OS versions 12.1.4 ant\u00e9rieures \u00e0 12.1.4-h6",
      "product": {
        "name": "PAN-OS",
        "vendor": {
          "name": "Palo Alto Networks",
          "scada": false
        }
      }
    },
    {
      "description": "PAN-OS versions 11.2.10 ant\u00e9rieures \u00e0 11.2.10-h6",
      "product": {
        "name": "PAN-OS",
        "vendor": {
          "name": "Palo Alto Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Prisma Access Agent (Endpoint DLP) versions 25.x \u00e0 26.x ant\u00e9rieures \u00e0 26.2.1 pour Windows et macOS",
      "product": {
        "name": "Prisma Access Browser",
        "vendor": {
          "name": "Palo Alto Networks",
          "scada": false
        }
      }
    },
    {
      "description": "PAN-OS versions 10.2.18 ant\u00e9rieures \u00e0 10.2.18-h6",
      "product": {
        "name": "PAN-OS",
        "vendor": {
          "name": "Palo Alto Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Prisma Access versions 11.2.x ant\u00e9rieures \u00e0 11.2.7-h13",
      "product": {
        "name": "Prisma Access Browser",
        "vendor": {
          "name": "Palo Alto Networks",
          "scada": false
        }
      }
    },
    {
      "description": "WildFire WF-500 et WF-500-B versions 10.2.16 ant\u00e9rieures \u00e0 10.2.16-h7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Palo Alto Networks",
          "scada": false
        }
      }
    },
    {
      "description": "GlobalProtect App versions 6.3.x ant\u00e9rieures \u00e0 6.3.3-h2 pour Linux",
      "product": {
        "name": "GlobalProtect App",
        "vendor": {
          "name": "Palo Alto Networks",
          "scada": false
        }
      }
    },
    {
      "description": "GlobalProtect UWP App versions 6.3 ant\u00e9rieures \u00e0 6.3.3-h10",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Palo Alto Networks",
          "scada": false
        }
      }
    },
    {
      "description": "WildFire WF-500 et WF-500-B versions 11.1.15",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Palo Alto Networks",
          "scada": false
        }
      }
    },
    {
      "description": "GlobalProtect App versions 6.3.x ant\u00e9rieures \u00e0 6.3.3-h10 pour Windows et macOS",
      "product": {
        "name": "GlobalProtect App",
        "vendor": {
          "name": "Palo Alto Networks",
          "scada": false
        }
      }
    },
    {
      "description": "WildFire WF-500 et WF-500-B versions 11.2.7 ant\u00e9rieures \u00e0 11.2.7-h13",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Palo Alto Networks",
          "scada": false
        }
      }
    },
    {
      "description": "GlobalProtect App versions 6.2.x ant\u00e9rieures \u00e0 6.2.8-h10 (6.2.8-948)",
      "product": {
        "name": "GlobalProtect App",
        "vendor": {
          "name": "Palo Alto Networks",
          "scada": false
        }
      }
    },
    {
      "description": "WildFire WF-500 et WF-500-B versions 11.2.4 ant\u00e9rieures \u00e0 11.2.4-h17",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Palo Alto Networks",
          "scada": false
        }
      }
    },
    {
      "description": "PAN-OS versions 11.1.6 ant\u00e9rieures \u00e0 11.1.6-h32",
      "product": {
        "name": "PAN-OS",
        "vendor": {
          "name": "Palo Alto Networks",
          "scada": false
        }
      }
    },
    {
      "description": "PAN-OS versions 11.1.13 ant\u00e9rieures \u00e0 11.1.13-h5",
      "product": {
        "name": "PAN-OS",
        "vendor": {
          "name": "Palo Alto Networks",
          "scada": false
        }
      }
    },
    {
      "description": "PAN-OS versions 10.2.10 ant\u00e9rieures \u00e0 10.2.10-h36",
      "product": {
        "name": "PAN-OS",
        "vendor": {
          "name": "Palo Alto Networks",
          "scada": false
        }
      }
    },
    {
      "description": "PAN-OS versions 11.2.7 ant\u00e9rieures \u00e0 11.2.7-h13",
      "product": {
        "name": "PAN-OS",
        "vendor": {
          "name": "Palo Alto Networks",
          "scada": false
        }
      }
    },
    {
      "description": "WildFire WF-500 et WF-500-B versions 12.1.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Palo Alto Networks",
          "scada": false
        }
      }
    },
    {
      "description": "Trust Protection Foundation versions 25.1.x ant\u00e9rieures \u00e0 25.1.8",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Palo Alto Networks",
          "scada": false
        }
      }
    },
    {
      "description": "PAN-OS versions 10.2.13 ant\u00e9rieures \u00e0 10.2.13-h21",
      "product": {
        "name": "PAN-OS",
        "vendor": {
          "name": "Palo Alto Networks",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "L\u0027\u00e9diteur indique que des correctifs seront publi\u00e9s le 28 mai 2026.",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2026-4678",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-4678"
    },
    {
      "name": "CVE-2026-4448",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-4448"
    },
    {
      "name": "CVE-2026-5914",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-5914"
    },
    {
      "name": "CVE-2026-5289",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-5289"
    },
    {
      "name": "CVE-2026-4460",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-4460"
    },
    {
      "name": "CVE-2026-5886",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-5886"
    },
    {
      "name": "CVE-2026-4445",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-4445"
    },
    {
      "name": "CVE-2026-5278",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-5278"
    },
    {
      "name": "CVE-2026-4444",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-4444"
    },
    {
      "name": "CVE-2026-4673",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-4673"
    },
    {
      "name": "CVE-2026-0264",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-0264"
    },
    {
      "name": "CVE-2026-0241",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-0241"
    },
    {
      "name": "CVE-2026-0251",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-0251"
    },
    {
      "name": "CVE-2026-4456",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-4456"
    },
    {
      "name": "CVE-2026-5272",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-5272"
    },
    {
      "name": "CVE-2026-7359",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-7359"
    },
    {
      "name": "CVE-2026-4464",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-4464"
    },
    {
      "name": "CVE-2026-8022",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-8022"
    },
    {
      "name": "CVE-2026-7361",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-7361"
    },
    {
      "name": "CVE-2026-5291",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-5291"
    },
    {
      "name": "CVE-2026-4457",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-4457"
    },
    {
      "name": "CVE-2026-4461",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-4461"
    },
    {
      "name": "CVE-2026-5876",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-5876"
    },
    {
      "name": "CVE-2026-6921",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-6921"
    },
    {
      "name": "CVE-2026-4447",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-4447"
    },
    {
      "name": "CVE-2026-5284",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-5284"
    },
    {
      "name": "CVE-2026-5881",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-5881"
    },
    {
      "name": "CVE-2026-5282",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-5282"
    },
    {
      "name": "CVE-2026-0249",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-0249"
    },
    {
      "name": "CVE-2026-4442",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-4442"
    },
    {
      "name": "CVE-2026-0263",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-0263"
    },
    {
      "name": "CVE-2026-5283",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-5283"
    },
    {
      "name": "CVE-2026-4676",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-4676"
    },
    {
      "name": "CVE-2026-0265",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-0265"
    },
    {
      "name": "CVE-2026-4675",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-4675"
    },
    {
      "name": "CVE-2026-0244",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-0244"
    },
    {
      "name": "CVE-2026-0258",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-0258"
    },
    {
      "name": "CVE-2026-4446",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-4446"
    },
    {
      "name": "CVE-2026-4679",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-4679"
    },
    {
      "name": "CVE-2026-4674",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-4674"
    },
    {
      "name": "CVE-2026-0256",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-0256"
    },
    {
      "name": "CVE-2026-0261",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-0261"
    },
    {
      "name": "CVE-2026-5274",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-5274"
    },
    {
      "name": "CVE-2026-4463",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-4463"
    },
    {
      "name": "CVE-2026-5909",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-5909"
    },
    {
      "name": "CVE-2026-0243",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-0243"
    },
    {
      "name": "CVE-2026-0242",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-0242"
    },
    {
      "name": "CVE-2026-4441",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-4441"
    },
    {
      "name": "CVE-2026-0239",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-0239"
    },
    {
      "name": "CVE-2026-7981",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-7981"
    },
    {
      "name": "CVE-2026-5276",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-5276"
    },
    {
      "name": "CVE-2026-6305",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-6305"
    },
    {
      "name": "CVE-2026-0250",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-0250"
    },
    {
      "name": "CVE-2026-4439",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-4439"
    },
    {
      "name": "CVE-2026-5893",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-5893"
    },
    {
      "name": "CVE-2026-5285",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-5285"
    },
    {
      "name": "CVE-2026-4452",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-4452"
    },
    {
      "name": "CVE-2026-4462",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-4462"
    },
    {
      "name": "CVE-2026-4680",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-4680"
    },
    {
      "name": "CVE-2026-0237",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-0237"
    },
    {
      "name": "CVE-2026-4677",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-4677"
    },
    {
      "name": "CVE-2026-5919",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-5919"
    },
    {
      "name": "CVE-2026-6361",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-6361"
    },
    {
      "name": "CVE-2026-0238",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-0238"
    },
    {
      "name": "CVE-2026-8018",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-8018"
    },
    {
      "name": "CVE-2026-7363",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-7363"
    },
    {
      "name": "CVE-2026-5273",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-5273"
    },
    {
      "name": "CVE-2026-4458",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-4458"
    },
    {
      "name": "CVE-2026-4459",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-4459"
    },
    {
      "name": "CVE-2026-0246",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-0246"
    },
    {
      "name": "CVE-2026-4450",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-4450"
    },
    {
      "name": "CVE-2026-5275",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-5275"
    },
    {
      "name": "CVE-2026-4455",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-4455"
    },
    {
      "name": "CVE-2026-0262",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-0262"
    },
    {
      "name": "CVE-2026-5280",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-5280"
    },
    {
      "name": "CVE-2026-5286",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-5286"
    },
    {
      "name": "CVE-2026-0257",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-0257"
    },
    {
      "name": "CVE-2026-5884",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-5884"
    },
    {
      "name": "CVE-2026-5287",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-5287"
    },
    {
      "name": "CVE-2026-4449",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-4449"
    },
    {
      "name": "CVE-2026-5277",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-5277"
    },
    {
      "name": "CVE-2026-7343",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-7343"
    },
    {
      "name": "CVE-2026-5292",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-5292"
    },
    {
      "name": "CVE-2026-5290",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-5290"
    },
    {
      "name": "CVE-2026-0245",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-0245"
    },
    {
      "name": "CVE-2026-0248",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-0248"
    },
    {
      "name": "CVE-2026-0235",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-0235"
    },
    {
      "name": "CVE-2026-4451",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-4451"
    },
    {
      "name": "CVE-2026-4440",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-4440"
    },
    {
      "name": "CVE-2026-0247",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-0247"
    },
    {
      "name": "CVE-2026-0236",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-0236"
    },
    {
      "name": "CVE-2026-5281",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-5281"
    },
    {
      "name": "CVE-2026-0240",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-0240"
    },
    {
      "name": "CVE-2026-4443",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-4443"
    },
    {
      "name": "CVE-2026-5288",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-5288"
    },
    {
      "name": "CVE-2026-0259",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-0259"
    },
    {
      "name": "CVE-2026-5279",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-5279"
    },
    {
      "name": "CVE-2026-4453",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-4453"
    },
    {
      "name": "CVE-2026-4454",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-4454"
    }
  ],
  "initial_release_date": "2026-05-15T00:00:00",
  "last_revision_date": "2026-05-15T00:00:00",
  "links": [],
  "reference": "CERTFR-2026-AVI-0596",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2026-05-15T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Injection SQL (SQLi)"
    },
    {
      "description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Palo Alto Networks. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Palo Alto Networks",
  "vendor_advisories": [
    {
      "published_at": "2026-05-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2026-0242",
      "url": "https://security.paloaltonetworks.com/CVE-2026-0242"
    },
    {
      "published_at": "2026-05-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2026-0251",
      "url": "https://security.paloaltonetworks.com/CVE-2026-0251"
    },
    {
      "published_at": "2026-05-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2026-0238",
      "url": "https://security.paloaltonetworks.com/CVE-2026-0238"
    },
    {
      "published_at": "2026-05-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2026-0263",
      "url": "https://security.paloaltonetworks.com/CVE-2026-0263"
    },
    {
      "published_at": "2026-05-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2026-0259",
      "url": "https://security.paloaltonetworks.com/CVE-2026-0259"
    },
    {
      "published_at": "2026-05-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2026-0257",
      "url": "https://security.paloaltonetworks.com/CVE-2026-0257"
    },
    {
      "published_at": "2026-05-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2026-0262",
      "url": "https://security.paloaltonetworks.com/CVE-2026-0262"
    },
    {
      "published_at": "2026-05-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2026-0243",
      "url": "https://security.paloaltonetworks.com/CVE-2026-0243"
    },
    {
      "published_at": "2026-05-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2026-0247",
      "url": "https://security.paloaltonetworks.com/CVE-2026-0247"
    },
    {
      "published_at": "2026-05-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2026-0261",
      "url": "https://security.paloaltonetworks.com/CVE-2026-0261"
    },
    {
      "published_at": "2026-05-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2026-0240",
      "url": "https://security.paloaltonetworks.com/CVE-2026-0240"
    },
    {
      "published_at": "2026-05-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2026-0239",
      "url": "https://security.paloaltonetworks.com/CVE-2026-0239"
    },
    {
      "published_at": "2026-05-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2026-0248",
      "url": "https://security.paloaltonetworks.com/CVE-2026-0248"
    },
    {
      "published_at": "2026-05-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2026-0246",
      "url": "https://security.paloaltonetworks.com/CVE-2026-0246"
    },
    {
      "published_at": "2026-05-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks PAN-SA-2026-0007",
      "url": "https://security.paloaltonetworks.com/PAN-SA-2026-0007"
    },
    {
      "published_at": "2026-05-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2026-0265",
      "url": "https://security.paloaltonetworks.com/CVE-2026-0265"
    },
    {
      "published_at": "2026-05-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2026-0250",
      "url": "https://security.paloaltonetworks.com/CVE-2026-0250"
    },
    {
      "published_at": "2026-05-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2026-0264",
      "url": "https://security.paloaltonetworks.com/CVE-2026-0264"
    },
    {
      "published_at": "2026-05-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2026-0256",
      "url": "https://security.paloaltonetworks.com/CVE-2026-0256"
    },
    {
      "published_at": "2026-05-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2026-0241",
      "url": "https://security.paloaltonetworks.com/CVE-2026-0241"
    },
    {
      "published_at": "2026-05-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2026-0245",
      "url": "https://security.paloaltonetworks.com/CVE-2026-0245"
    },
    {
      "published_at": "2026-05-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2026-0258",
      "url": "https://security.paloaltonetworks.com/CVE-2026-0258"
    },
    {
      "published_at": "2026-05-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2026-0249",
      "url": "https://security.paloaltonetworks.com/CVE-2026-0249"
    },
    {
      "published_at": "2026-05-13",
      "title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2026-0244",
      "url": "https://security.paloaltonetworks.com/CVE-2026-0244"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.

Sightings

Author Source Type Date Other

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…