CVE-2026-0231 (GCVE-0-2026-0231)

Vulnerability from cvelistv5 – Published: 2026-03-11 18:03 – Updated: 2026-03-11 20:21
VLAI?
Title
Cortex XDR Broker VM: Sensitive Information Disclosure Vulnerability
Summary
An information disclosure vulnerability in Palo Alto Networks Cortex XDR® Broker VM allows an authenticated user to obtain and modify sensitive information by triggering live terminal session via Cortex UI and modifying any configuration setting.  The attacker must have network access to the Broker VM to exploit this issue.
CWE
  • CWE-497 - Exposure of Sensitive System Information to an Unauthorized Control Sphere
Assigner
References
Impacted products
Vendor Product Version
Palo Alto Networks Cortex XDR Broker VM Affected: 30.0.0 , < 30.0.49 (custom)
Create a notification for this product.
Credits
an internal reporter, Nicola Kalak,
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2026-0231",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-03-11T20:21:23.660381Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-03-11T20:21:35.933Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Cortex XDR Broker VM",
          "vendor": "Palo Alto Networks",
          "versions": [
            {
              "changes": [
                {
                  "at": "30.0.49",
                  "status": "unaffected"
                }
              ],
              "lessThan": "30.0.49",
              "status": "affected",
              "version": "30.0.0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "configurations": [
        {
          "lang": "eng",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "No special configuration is required to be affected by this issue."
            }
          ],
          "value": "No special configuration is required to be affected by this issue."
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:a:palo_alto_networks:cortex_xdr_broker_vm:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "30.0.49",
                  "versionStartIncluding": "30.0.0",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ],
          "operator": "OR"
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "an internal reporter, Nicola Kalak,"
        }
      ],
      "datePublic": "2026-03-11T16:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "An information disclosure vulnerability in\u0026nbsp;Palo Alto Networks Cortex XDR\u00ae Broker VM allows an authenticated user to obtain and modify sensitive information by triggering live terminal session via Cortex UI \u003cspan\u003eand modifying any configuration setting\u003c/span\u003e.\u0026nbsp;\u003cbr\u003e\u003cp\u003eThe attacker must have network access to the Broker VM to exploit this issue.\u003c/p\u003e"
            }
          ],
          "value": "An information disclosure vulnerability in\u00a0Palo Alto Networks Cortex XDR\u00ae Broker VM allows an authenticated user to obtain and modify sensitive information by triggering live terminal session via Cortex UI and modifying any configuration setting.\u00a0\nThe attacker must have network access to the Broker VM to exploit this issue."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue."
            }
          ],
          "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-37",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-37 Retrieve Embedded Sensitive Data"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NO",
            "Recovery": "USER",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "LOCAL",
            "baseScore": 5.7,
            "baseSeverity": "MEDIUM",
            "exploitMaturity": "UNREPORTED",
            "privilegesRequired": "HIGH",
            "providerUrgency": "AMBER",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "NONE",
            "valueDensity": "DIFFUSE",
            "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/AU:N/R:U/V:D/RE:M/U:Amber",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "HIGH",
            "vulnerabilityResponseEffort": "MODERATE"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-497",
              "description": "CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-03-11T18:03:21.302Z",
        "orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0",
        "shortName": "palo_alto"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://security.paloaltonetworks.com/CVE-2026-0231"
        }
      ],
      "solutions": [
        {
          "lang": "eng",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003e\u003cspan\u003eThis issue is fixed in Cortex XDR Broker VM  30.0.49, and all later Cortex XDR Broker VM versions.\u003c/span\u003e\u003c/p\u003e\u003cul\u003e\u003cli\u003e\u003cp\u003e\u003cspan\u003eIf automatic upgrades are enabled for Broker VM, then no action is required at this time.\u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003c/ul\u003e\u003cul\u003e\u003cli\u003e\u003cp\u003e\u003cspan\u003eIf automatic upgrades are not enabled for Broker VM, then we recommend that you do so to ensure that you always have the latest security patches installed in your software.\u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003c/ul\u003e"
            }
          ],
          "value": "This issue is fixed in Cortex XDR Broker VM 30.0.49, and all later Cortex XDR Broker VM versions.\n\n * If automatic upgrades are enabled for Broker VM, then no action is required at this time.\n\n * If automatic upgrades are not enabled for Broker VM, then we recommend that you do so to ensure that you always have the latest security patches installed in your software."
        }
      ],
      "source": {
        "discovery": "INTERNAL"
      },
      "timeline": [
        {
          "lang": "en",
          "time": "2026-03-11T16:00:00.000Z",
          "value": "Initial Publication"
        }
      ],
      "title": "Cortex XDR Broker VM: Sensitive Information Disclosure Vulnerability",
      "workarounds": [
        {
          "lang": "eng",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "No known workarounds exist for this issue."
            }
          ],
          "value": "No known workarounds exist for this issue."
        }
      ],
      "x_affectedList": [
        "Cortex XDR Broker VM 30.0.0",
        "Cortex XDR Broker VM 30.0.1",
        "Cortex XDR Broker VM 30.0.2",
        "Cortex XDR Broker VM 30.0.3",
        "Cortex XDR Broker VM 30.0.4",
        "Cortex XDR Broker VM 30.0.5",
        "Cortex XDR Broker VM 30.0.6",
        "Cortex XDR Broker VM 30.0.7",
        "Cortex XDR Broker VM 30.0.8",
        "Cortex XDR Broker VM 30.0.9",
        "Cortex XDR Broker VM 30.0.10",
        "Cortex XDR Broker VM 30.0.11",
        "Cortex XDR Broker VM 30.0.12",
        "Cortex XDR Broker VM 30.0.13",
        "Cortex XDR Broker VM 30.0.14",
        "Cortex XDR Broker VM 30.0.15",
        "Cortex XDR Broker VM 30.0.16",
        "Cortex XDR Broker VM 30.0.17",
        "Cortex XDR Broker VM 30.0.18",
        "Cortex XDR Broker VM 30.0.19",
        "Cortex XDR Broker VM 30.0.20",
        "Cortex XDR Broker VM 30.0.21",
        "Cortex XDR Broker VM 30.0.22",
        "Cortex XDR Broker VM 30.0.23",
        "Cortex XDR Broker VM 30.0.24",
        "Cortex XDR Broker VM 30.0.25",
        "Cortex XDR Broker VM 30.0.26",
        "Cortex XDR Broker VM 30.0.27",
        "Cortex XDR Broker VM 30.0.28",
        "Cortex XDR Broker VM 30.0.29",
        "Cortex XDR Broker VM 30.0.30",
        "Cortex XDR Broker VM 30.0.31",
        "Cortex XDR Broker VM 30.0.32",
        "Cortex XDR Broker VM 30.0.33",
        "Cortex XDR Broker VM 30.0.34",
        "Cortex XDR Broker VM 30.0.35",
        "Cortex XDR Broker VM 30.0.36",
        "Cortex XDR Broker VM 30.0.37",
        "Cortex XDR Broker VM 30.0.38",
        "Cortex XDR Broker VM 30.0.39",
        "Cortex XDR Broker VM 30.0.40",
        "Cortex XDR Broker VM 30.0.41",
        "Cortex XDR Broker VM 30.0.42",
        "Cortex XDR Broker VM 30.0.43",
        "Cortex XDR Broker VM 30.0.44",
        "Cortex XDR Broker VM 30.0.45",
        "Cortex XDR Broker VM 30.0.46",
        "Cortex XDR Broker VM 30.0.47",
        "Cortex XDR Broker VM 30.0.48"
      ],
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0",
    "assignerShortName": "palo_alto",
    "cveId": "CVE-2026-0231",
    "datePublished": "2026-03-11T18:03:21.302Z",
    "dateReserved": "2025-11-03T20:43:52.020Z",
    "dateUpdated": "2026-03-11T20:21:35.933Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2026-0231\",\"sourceIdentifier\":\"psirt@paloaltonetworks.com\",\"published\":\"2026-03-11T18:16:21.413\",\"lastModified\":\"2026-03-12T21:08:22.643\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An information disclosure vulnerability in\u00a0Palo Alto Networks Cortex XDR\u00ae Broker VM allows an authenticated user to obtain and modify sensitive information by triggering live terminal session via Cortex UI and modifying any configuration setting.\u00a0\\nThe attacker must have network access to the Broker VM to exploit this issue.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"psirt@paloaltonetworks.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:U/V:D/RE:M/U:Amber\",\"baseScore\":5.7,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"attackRequirements\":\"NONE\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"vulnConfidentialityImpact\":\"HIGH\",\"vulnIntegrityImpact\":\"HIGH\",\"vulnAvailabilityImpact\":\"HIGH\",\"subConfidentialityImpact\":\"NONE\",\"subIntegrityImpact\":\"NONE\",\"subAvailabilityImpact\":\"NONE\",\"exploitMaturity\":\"UNREPORTED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NO\",\"Recovery\":\"USER\",\"valueDensity\":\"DIFFUSE\",\"vulnerabilityResponseEffort\":\"MODERATE\",\"providerUrgency\":\"AMBER\"}}]},\"weaknesses\":[{\"source\":\"psirt@paloaltonetworks.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-497\"}]}],\"references\":[{\"url\":\"https://security.paloaltonetworks.com/CVE-2026-0231\",\"source\":\"psirt@paloaltonetworks.com\"}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-0231\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-03-11T20:21:23.660381Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-03-11T20:21:28.913Z\"}}], \"cna\": {\"title\": \"Cortex XDR Broker VM: Sensitive Information Disclosure Vulnerability\", \"source\": {\"discovery\": \"INTERNAL\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"an internal reporter, Nicola Kalak,\"}], \"impacts\": [{\"capecId\": \"CAPEC-37\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-37 Retrieve Embedded Sensitive Data\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV4_0\": {\"Safety\": \"NOT_DEFINED\", \"version\": \"4.0\", \"Recovery\": \"USER\", \"baseScore\": 5.7, \"Automatable\": \"NO\", \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"valueDensity\": \"DIFFUSE\", \"vectorString\": \"CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/AU:N/R:U/V:D/RE:M/U:Amber\", \"exploitMaturity\": \"UNREPORTED\", \"providerUrgency\": \"AMBER\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"attackRequirements\": \"NONE\", \"privilegesRequired\": \"HIGH\", \"subIntegrityImpact\": \"NONE\", \"vulnIntegrityImpact\": \"HIGH\", \"subAvailabilityImpact\": \"NONE\", \"vulnAvailabilityImpact\": \"HIGH\", \"subConfidentialityImpact\": \"NONE\", \"vulnConfidentialityImpact\": \"HIGH\", \"vulnerabilityResponseEffort\": \"MODERATE\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Palo Alto Networks\", \"product\": \"Cortex XDR Broker VM\", \"versions\": [{\"status\": \"affected\", \"changes\": [{\"at\": \"30.0.49\", \"status\": \"unaffected\"}], \"version\": \"30.0.0\", \"lessThan\": \"30.0.49\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}], \"exploits\": [{\"lang\": \"en\", \"value\": \"Palo Alto Networks is not aware of any malicious exploitation of this issue.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"Palo Alto Networks is not aware of any malicious exploitation of this issue.\", \"base64\": false}]}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2026-03-11T16:00:00.000Z\", \"value\": \"Initial Publication\"}], \"solutions\": [{\"lang\": \"eng\", \"value\": \"This issue is fixed in Cortex XDR Broker VM 30.0.49, and all later Cortex XDR Broker VM versions.\\n\\n * If automatic upgrades are enabled for Broker VM, then no action is required at this time.\\n\\n * If automatic upgrades are not enabled for Broker VM, then we recommend that you do so to ensure that you always have the latest security patches installed in your software.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003e\u003cspan\u003eThis issue is fixed in Cortex XDR Broker VM  30.0.49, and all later Cortex XDR Broker VM versions.\u003c/span\u003e\u003c/p\u003e\u003cul\u003e\u003cli\u003e\u003cp\u003e\u003cspan\u003eIf automatic upgrades are enabled for Broker VM, then no action is required at this time.\u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003c/ul\u003e\u003cul\u003e\u003cli\u003e\u003cp\u003e\u003cspan\u003eIf automatic upgrades are not enabled for Broker VM, then we recommend that you do so to ensure that you always have the latest security patches installed in your software.\u003c/span\u003e\u003c/p\u003e\u003c/li\u003e\u003c/ul\u003e\", \"base64\": false}]}], \"datePublic\": \"2026-03-11T16:00:00.000Z\", \"references\": [{\"url\": \"https://security.paloaltonetworks.com/CVE-2026-0231\", \"tags\": [\"vendor-advisory\"]}], \"workarounds\": [{\"lang\": \"eng\", \"value\": \"No known workarounds exist for this issue.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"No known workarounds exist for this issue.\", \"base64\": false}]}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"An information disclosure vulnerability in\\u00a0Palo Alto Networks Cortex XDR\\u00ae Broker VM allows an authenticated user to obtain and modify sensitive information by triggering live terminal session via Cortex UI and modifying any configuration setting.\\u00a0\\nThe attacker must have network access to the Broker VM to exploit this issue.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"An information disclosure vulnerability in\u0026nbsp;Palo Alto Networks Cortex XDR\\u00ae Broker VM allows an authenticated user to obtain and modify sensitive information by triggering live terminal session via Cortex UI \u003cspan\u003eand modifying any configuration setting\u003c/span\u003e.\u0026nbsp;\u003cbr\u003e\u003cp\u003eThe attacker must have network access to the Broker VM to exploit this issue.\u003c/p\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-497\", \"description\": \"CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere\"}]}], \"configurations\": [{\"lang\": \"eng\", \"value\": \"No special configuration is required to be affected by this issue.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"No special configuration is required to be affected by this issue.\", \"base64\": false}]}], \"x_affectedList\": [\"Cortex XDR Broker VM 30.0.0\", \"Cortex XDR Broker VM 30.0.1\", \"Cortex XDR Broker VM 30.0.2\", \"Cortex XDR Broker VM 30.0.3\", \"Cortex XDR Broker VM 30.0.4\", \"Cortex XDR Broker VM 30.0.5\", \"Cortex XDR Broker VM 30.0.6\", \"Cortex XDR Broker VM 30.0.7\", \"Cortex XDR Broker VM 30.0.8\", \"Cortex XDR Broker VM 30.0.9\", \"Cortex XDR Broker VM 30.0.10\", \"Cortex XDR Broker VM 30.0.11\", \"Cortex XDR Broker VM 30.0.12\", \"Cortex XDR Broker VM 30.0.13\", \"Cortex XDR Broker VM 30.0.14\", \"Cortex XDR Broker VM 30.0.15\", \"Cortex XDR Broker VM 30.0.16\", \"Cortex XDR Broker VM 30.0.17\", \"Cortex XDR Broker VM 30.0.18\", \"Cortex XDR Broker VM 30.0.19\", \"Cortex XDR Broker VM 30.0.20\", \"Cortex XDR Broker VM 30.0.21\", \"Cortex XDR Broker VM 30.0.22\", \"Cortex XDR Broker VM 30.0.23\", \"Cortex XDR Broker VM 30.0.24\", \"Cortex XDR Broker VM 30.0.25\", \"Cortex XDR Broker VM 30.0.26\", \"Cortex XDR Broker VM 30.0.27\", \"Cortex XDR Broker VM 30.0.28\", \"Cortex XDR Broker VM 30.0.29\", \"Cortex XDR Broker VM 30.0.30\", \"Cortex XDR Broker VM 30.0.31\", \"Cortex XDR Broker VM 30.0.32\", \"Cortex XDR Broker VM 30.0.33\", \"Cortex XDR Broker VM 30.0.34\", \"Cortex XDR Broker VM 30.0.35\", \"Cortex XDR Broker VM 30.0.36\", \"Cortex XDR Broker VM 30.0.37\", \"Cortex XDR Broker VM 30.0.38\", \"Cortex XDR Broker VM 30.0.39\", \"Cortex XDR Broker VM 30.0.40\", \"Cortex XDR Broker VM 30.0.41\", \"Cortex XDR Broker VM 30.0.42\", \"Cortex XDR Broker VM 30.0.43\", \"Cortex XDR Broker VM 30.0.44\", \"Cortex XDR Broker VM 30.0.45\", \"Cortex XDR Broker VM 30.0.46\", \"Cortex XDR Broker VM 30.0.47\", \"Cortex XDR Broker VM 30.0.48\"], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:a:palo_alto_networks:cortex_xdr_broker_vm:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"30.0.49\", \"versionStartIncluding\": \"30.0.0\"}], \"operator\": \"OR\"}], \"operator\": \"OR\"}], \"providerMetadata\": {\"orgId\": \"d6c1279f-00f6-4ef7-9217-f89ffe703ec0\", \"shortName\": \"palo_alto\", \"dateUpdated\": \"2026-03-11T18:03:21.302Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2026-0231\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-03-11T20:21:35.933Z\", \"dateReserved\": \"2025-11-03T20:43:52.020Z\", \"assignerOrgId\": \"d6c1279f-00f6-4ef7-9217-f89ffe703ec0\", \"datePublished\": \"2026-03-11T18:03:21.302Z\", \"assignerShortName\": \"palo_alto\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.2"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…