CVE-2026-0231 (GCVE-0-2026-0231)
Vulnerability from cvelistv5
Published
2026-03-11 18:03
Modified
2026-03-11 20:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-497 - Exposure of Sensitive System Information to an Unauthorized Control Sphere
Summary
An information disclosure vulnerability in Palo Alto Networks Cortex XDR® Broker VM allows an authenticated user to obtain and modify sensitive information by triggering live terminal session via Cortex UI and modifying any configuration setting.
The attacker must have network access to the Broker VM to exploit this issue.
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Palo Alto Networks | Cortex XDR Broker VM |
Version: 30.0.0 < 30.0.49 |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-0231",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-03-11T20:21:23.660381Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-03-11T20:21:35.933Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Cortex XDR Broker VM",
"vendor": "Palo Alto Networks",
"versions": [
{
"changes": [
{
"at": "30.0.49",
"status": "unaffected"
}
],
"lessThan": "30.0.49",
"status": "affected",
"version": "30.0.0",
"versionType": "custom"
}
]
}
],
"configurations": [
{
"lang": "eng",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "No special configuration is required to be affected by this issue."
}
],
"value": "No special configuration is required to be affected by this issue."
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:palo_alto_networks:cortex_xdr_broker_vm:*:*:*:*:*:*:*:*",
"versionEndExcluding": "30.0.49",
"versionStartIncluding": "30.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "OR"
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "an internal reporter, Nicola Kalak,"
}
],
"datePublic": "2026-03-11T16:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "An information disclosure vulnerability in\u0026nbsp;Palo Alto Networks Cortex XDR\u00ae Broker VM allows an authenticated user to obtain and modify sensitive information by triggering live terminal session via Cortex UI \u003cspan\u003eand modifying any configuration setting\u003c/span\u003e.\u0026nbsp;\u003cbr\u003e\u003cp\u003eThe attacker must have network access to the Broker VM to exploit this issue.\u003c/p\u003e"
}
],
"value": "An information disclosure vulnerability in\u00a0Palo Alto Networks Cortex XDR\u00ae Broker VM allows an authenticated user to obtain and modify sensitive information by triggering live terminal session via Cortex UI and modifying any configuration setting.\u00a0\nThe attacker must have network access to the Broker VM to exploit this issue."
}
],
"exploits": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Palo Alto Networks is not aware of any malicious exploitation of this issue."
}
],
"value": "Palo Alto Networks is not aware of any malicious exploitation of this issue."
}
],
"impacts": [
{
"capecId": "CAPEC-37",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-37 Retrieve Embedded Sensitive Data"
}
]
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NO",
"Recovery": "USER",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "LOCAL",
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"exploitMaturity": "UNREPORTED",
"privilegesRequired": "HIGH",
"providerUrgency": "AMBER",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "DIFFUSE",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/AU:N/R:U/V:D/RE:M/U:Amber",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "MODERATE"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-497",
"description": "CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-03-11T18:03:21.302Z",
"orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0",
"shortName": "palo_alto"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://security.paloaltonetworks.com/CVE-2026-0231"
}
],
"solutions": [
{
"lang": "eng",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003e\u003cspan\u003eThis issue is fixed in Cortex XDR Broker VM 30.0.49, and all later Cortex XDR Broker VM versions.\u003c/span\u003e\u003c/p\u003e\u003cul\u003e\u003cli\u003e\u003cp\u003e\u003cspan\u003eIf automatic upgrades are enabled for Broker VM, then no action is required at this time.\u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003c/ul\u003e\u003cul\u003e\u003cli\u003e\u003cp\u003e\u003cspan\u003eIf automatic upgrades are not enabled for Broker VM, then we recommend that you do so to ensure that you always have the latest security patches installed in your software.\u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003c/ul\u003e"
}
],
"value": "This issue is fixed in Cortex XDR Broker VM 30.0.49, and all later Cortex XDR Broker VM versions.\n\n * If automatic upgrades are enabled for Broker VM, then no action is required at this time.\n\n * If automatic upgrades are not enabled for Broker VM, then we recommend that you do so to ensure that you always have the latest security patches installed in your software."
}
],
"source": {
"discovery": "INTERNAL"
},
"timeline": [
{
"lang": "en",
"time": "2026-03-11T16:00:00.000Z",
"value": "Initial Publication"
}
],
"title": "Cortex XDR Broker VM: Sensitive Information Disclosure Vulnerability",
"workarounds": [
{
"lang": "eng",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "No known workarounds exist for this issue."
}
],
"value": "No known workarounds exist for this issue."
}
],
"x_affectedList": [
"Cortex XDR Broker VM 30.0.0",
"Cortex XDR Broker VM 30.0.1",
"Cortex XDR Broker VM 30.0.2",
"Cortex XDR Broker VM 30.0.3",
"Cortex XDR Broker VM 30.0.4",
"Cortex XDR Broker VM 30.0.5",
"Cortex XDR Broker VM 30.0.6",
"Cortex XDR Broker VM 30.0.7",
"Cortex XDR Broker VM 30.0.8",
"Cortex XDR Broker VM 30.0.9",
"Cortex XDR Broker VM 30.0.10",
"Cortex XDR Broker VM 30.0.11",
"Cortex XDR Broker VM 30.0.12",
"Cortex XDR Broker VM 30.0.13",
"Cortex XDR Broker VM 30.0.14",
"Cortex XDR Broker VM 30.0.15",
"Cortex XDR Broker VM 30.0.16",
"Cortex XDR Broker VM 30.0.17",
"Cortex XDR Broker VM 30.0.18",
"Cortex XDR Broker VM 30.0.19",
"Cortex XDR Broker VM 30.0.20",
"Cortex XDR Broker VM 30.0.21",
"Cortex XDR Broker VM 30.0.22",
"Cortex XDR Broker VM 30.0.23",
"Cortex XDR Broker VM 30.0.24",
"Cortex XDR Broker VM 30.0.25",
"Cortex XDR Broker VM 30.0.26",
"Cortex XDR Broker VM 30.0.27",
"Cortex XDR Broker VM 30.0.28",
"Cortex XDR Broker VM 30.0.29",
"Cortex XDR Broker VM 30.0.30",
"Cortex XDR Broker VM 30.0.31",
"Cortex XDR Broker VM 30.0.32",
"Cortex XDR Broker VM 30.0.33",
"Cortex XDR Broker VM 30.0.34",
"Cortex XDR Broker VM 30.0.35",
"Cortex XDR Broker VM 30.0.36",
"Cortex XDR Broker VM 30.0.37",
"Cortex XDR Broker VM 30.0.38",
"Cortex XDR Broker VM 30.0.39",
"Cortex XDR Broker VM 30.0.40",
"Cortex XDR Broker VM 30.0.41",
"Cortex XDR Broker VM 30.0.42",
"Cortex XDR Broker VM 30.0.43",
"Cortex XDR Broker VM 30.0.44",
"Cortex XDR Broker VM 30.0.45",
"Cortex XDR Broker VM 30.0.46",
"Cortex XDR Broker VM 30.0.47",
"Cortex XDR Broker VM 30.0.48"
],
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0",
"assignerShortName": "palo_alto",
"cveId": "CVE-2026-0231",
"datePublished": "2026-03-11T18:03:21.302Z",
"dateReserved": "2025-11-03T20:43:52.020Z",
"dateUpdated": "2026-03-11T20:21:35.933Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-0231\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-03-11T20:21:23.660381Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-03-11T20:21:28.913Z\"}}], \"cna\": {\"title\": \"Cortex XDR Broker VM: Sensitive Information Disclosure Vulnerability\", \"source\": {\"discovery\": \"INTERNAL\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"an internal reporter, Nicola Kalak,\"}], \"impacts\": [{\"capecId\": \"CAPEC-37\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-37 Retrieve Embedded Sensitive Data\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV4_0\": {\"Safety\": \"NOT_DEFINED\", \"version\": \"4.0\", \"Recovery\": \"USER\", \"baseScore\": 5.7, \"Automatable\": \"NO\", \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"valueDensity\": \"DIFFUSE\", \"vectorString\": \"CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/AU:N/R:U/V:D/RE:M/U:Amber\", \"exploitMaturity\": \"UNREPORTED\", \"providerUrgency\": \"AMBER\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"attackRequirements\": \"NONE\", \"privilegesRequired\": \"HIGH\", \"subIntegrityImpact\": \"NONE\", \"vulnIntegrityImpact\": \"HIGH\", \"subAvailabilityImpact\": \"NONE\", \"vulnAvailabilityImpact\": \"HIGH\", \"subConfidentialityImpact\": \"NONE\", \"vulnConfidentialityImpact\": \"HIGH\", \"vulnerabilityResponseEffort\": \"MODERATE\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Palo Alto Networks\", \"product\": \"Cortex XDR Broker VM\", \"versions\": [{\"status\": \"affected\", \"changes\": [{\"at\": \"30.0.49\", \"status\": \"unaffected\"}], \"version\": \"30.0.0\", \"lessThan\": \"30.0.49\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}], \"exploits\": [{\"lang\": \"en\", \"value\": \"Palo Alto Networks is not aware of any malicious exploitation of this issue.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"Palo Alto Networks is not aware of any malicious exploitation of this issue.\", \"base64\": false}]}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2026-03-11T16:00:00.000Z\", \"value\": \"Initial Publication\"}], \"solutions\": [{\"lang\": \"eng\", \"value\": \"This issue is fixed in Cortex XDR Broker VM 30.0.49, and all later Cortex XDR Broker VM versions.\\n\\n * If automatic upgrades are enabled for Broker VM, then no action is required at this time.\\n\\n * If automatic upgrades are not enabled for Broker VM, then we recommend that you do so to ensure that you always have the latest security patches installed in your software.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003e\u003cspan\u003eThis issue is fixed in Cortex XDR Broker VM 30.0.49, and all later Cortex XDR Broker VM versions.\u003c/span\u003e\u003c/p\u003e\u003cul\u003e\u003cli\u003e\u003cp\u003e\u003cspan\u003eIf automatic upgrades are enabled for Broker VM, then no action is required at this time.\u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003c/ul\u003e\u003cul\u003e\u003cli\u003e\u003cp\u003e\u003cspan\u003eIf automatic upgrades are not enabled for Broker VM, then we recommend that you do so to ensure that you always have the latest security patches installed in your software.\u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003c/ul\u003e\", \"base64\": false}]}], \"datePublic\": \"2026-03-11T16:00:00.000Z\", \"references\": [{\"url\": \"https://security.paloaltonetworks.com/CVE-2026-0231\", \"tags\": [\"vendor-advisory\"]}], \"workarounds\": [{\"lang\": \"eng\", \"value\": \"No known workarounds exist for this issue.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"No known workarounds exist for this issue.\", \"base64\": false}]}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"An information disclosure vulnerability in\\u00a0Palo Alto Networks Cortex XDR\\u00ae Broker VM allows an authenticated user to obtain and modify sensitive information by triggering live terminal session via Cortex UI and modifying any configuration setting.\\u00a0\\nThe attacker must have network access to the Broker VM to exploit this issue.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"An information disclosure vulnerability in\u0026nbsp;Palo Alto Networks Cortex XDR\\u00ae Broker VM allows an authenticated user to obtain and modify sensitive information by triggering live terminal session via Cortex UI \u003cspan\u003eand modifying any configuration setting\u003c/span\u003e.\u0026nbsp;\u003cbr\u003e\u003cp\u003eThe attacker must have network access to the Broker VM to exploit this issue.\u003c/p\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-497\", \"description\": \"CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere\"}]}], \"configurations\": [{\"lang\": \"eng\", \"value\": \"No special configuration is required to be affected by this issue.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"No special configuration is required to be affected by this issue.\", \"base64\": false}]}], \"x_affectedList\": [\"Cortex XDR Broker VM 30.0.0\", \"Cortex XDR Broker VM 30.0.1\", \"Cortex XDR Broker VM 30.0.2\", \"Cortex XDR Broker VM 30.0.3\", \"Cortex XDR Broker VM 30.0.4\", \"Cortex XDR Broker VM 30.0.5\", \"Cortex XDR Broker VM 30.0.6\", \"Cortex XDR Broker VM 30.0.7\", \"Cortex XDR Broker VM 30.0.8\", \"Cortex XDR Broker VM 30.0.9\", \"Cortex XDR Broker VM 30.0.10\", \"Cortex XDR Broker VM 30.0.11\", \"Cortex XDR Broker VM 30.0.12\", \"Cortex XDR Broker VM 30.0.13\", \"Cortex XDR Broker VM 30.0.14\", \"Cortex XDR Broker VM 30.0.15\", \"Cortex XDR Broker VM 30.0.16\", \"Cortex XDR Broker VM 30.0.17\", \"Cortex XDR Broker VM 30.0.18\", \"Cortex XDR Broker VM 30.0.19\", \"Cortex XDR Broker VM 30.0.20\", \"Cortex XDR Broker VM 30.0.21\", \"Cortex XDR Broker VM 30.0.22\", \"Cortex XDR Broker VM 30.0.23\", \"Cortex XDR Broker VM 30.0.24\", \"Cortex XDR Broker VM 30.0.25\", \"Cortex XDR Broker VM 30.0.26\", \"Cortex XDR Broker VM 30.0.27\", \"Cortex XDR Broker VM 30.0.28\", \"Cortex XDR Broker VM 30.0.29\", \"Cortex XDR Broker VM 30.0.30\", \"Cortex XDR Broker VM 30.0.31\", \"Cortex XDR Broker VM 30.0.32\", \"Cortex XDR Broker VM 30.0.33\", \"Cortex XDR Broker VM 30.0.34\", \"Cortex XDR Broker VM 30.0.35\", \"Cortex XDR Broker VM 30.0.36\", \"Cortex XDR Broker VM 30.0.37\", \"Cortex XDR Broker VM 30.0.38\", \"Cortex XDR Broker VM 30.0.39\", \"Cortex XDR Broker VM 30.0.40\", \"Cortex XDR Broker VM 30.0.41\", \"Cortex XDR Broker VM 30.0.42\", \"Cortex XDR Broker VM 30.0.43\", \"Cortex XDR Broker VM 30.0.44\", \"Cortex XDR Broker VM 30.0.45\", \"Cortex XDR Broker VM 30.0.46\", \"Cortex XDR Broker VM 30.0.47\", \"Cortex XDR Broker VM 30.0.48\"], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:a:palo_alto_networks:cortex_xdr_broker_vm:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"30.0.49\", \"versionStartIncluding\": \"30.0.0\"}], \"operator\": \"OR\"}], \"operator\": \"OR\"}], \"providerMetadata\": {\"orgId\": \"d6c1279f-00f6-4ef7-9217-f89ffe703ec0\", \"shortName\": \"palo_alto\", \"dateUpdated\": \"2026-03-11T18:03:21.302Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2026-0231\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-03-11T20:21:35.933Z\", \"dateReserved\": \"2025-11-03T20:43:52.020Z\", \"assignerOrgId\": \"d6c1279f-00f6-4ef7-9217-f89ffe703ec0\", \"datePublished\": \"2026-03-11T18:03:21.302Z\", \"assignerShortName\": \"palo_alto\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…