Palo Alto Prisma Access Agent 25.x / 26.x < 26.2.1 Authentication Bypass (CVE-2026-0247)

high Nessus Plugin ID 314973

Synopsis

A ZTNA/SASE client installed on the remote host is affected by an authentication bypass vulnerability.

Description

The version of Palo Alto Networks Prisma Access Agent installed on the remote host is 25.x or 26.x prior to 26.2.1.
It is, therefore, affected by an authentication bypass vulnerability:

- Multiple authorization bypass vulnerabilities in the Endpoint DLP component allow a local attacker to bypass authentication controls and execute privileged operations. (CVE-2026-0247)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Palo Alto Networks Prisma Access Agent version 26.2.1 or later.

See Also

http://www.nessus.org/u?afcb7ec0

Plugin Details

Severity: High

ID: 314973

File Name: palo_alto_prisma_access_agent_CVE-2026-0247.nasl

Version: 1.1

Type: Local

Agent: windows, macosx, unix

Family: Misc.

Published: 5/15/2026

Updated: 5/15/2026

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 8.4

CVSS v2

Risk Factor: High

Base Score: 7.2

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2026-0247

CVSS v3

Risk Factor: High

Base Score: 7.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVSS v4

Risk Factor: High

Base Score: 8.5

Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Vulnerability Information

CPE: cpe:/a:palo_alto_networks:prisma_access_agent

Required KB Items: installed_sw/Prisma Access Agent

Patch Publication Date: 5/13/2026

Vulnerability Publication Date: 5/13/2026

Reference Information

CVE: CVE-2026-0247