Description
An improper certificate validation vulnerability in PAN-OS allows users to connect Terminal Server Agents on Windows to PAN-OS using expired certificates even if the PAN-OS configuration would not normally permit them to do so.
Published: 2026-02-11
Score: 1.3 Low
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Terminal Server Agent connections using expired certificates
Action: Patch Now
AI Analysis

Impact

An improper certificate validation flaw in PAN-OS allows an attacker to connect Terminal Server Agents (TSAs) on Windows to the firewall by presenting an expired certificate, even when the firewall configuration would normally block such a connection. Because the system fails to enforce certificate validity, an attacker could establish a privileged remote session and potentially intercept or modify management traffic. The issue stems from a missing check for certificate expiration, a classic improper certificate validation weakness (CWE‑295).

Affected Systems

The vulnerability affects a wide range of Palo Alto Networks products: Cloud NGFW, PAN‑OS, and Prisma Access. All PAN‑OS releases prior to 12.1 are impacted, including 10.2.0‑10.2.16, 11.1.0‑11.1.10, and 11.2.0‑11.2.7. Upgrade guidance is as follows—PAN‑OS 10.2 should be updated to 10.2.17 or newer, PAN‑OS 11.1 to 11.1.11 or newer, and PAN‑OS 11.2 to 11.2.8 or newer. For Prisma Access deployments, 11.2 on PAN‑OS requires patch 11.2.7‑h10 or later, and 10.2 on PAN‑OS requires patch 10.2.10‑h28 or later. Cloud NGFW does not require action.

Risk and Exploitability

The CVSS score is 1.3, indicating very low severity, and the EPSS score is below 1 %, implying a negligible likelihood of exploitation at present. The flaw is not listed in the CISA KEV catalog. The probable attack vector requires an adversary who can configure or deploy a Terminal Server Agent that presents an expired certificate, which typically would necessitate some level of access to the network or the ability to run customized software. Because the vulnerability passes an expired certificate through the validation process, an attacker could gain unauthorized remote connectivity, though the overall risk remains low given the requirement for agent placement and the low exploitation probability.

Generated by OpenCVE AI on April 18, 2026 at 18:11 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade PAN‑OS to a fixed release: 10.2.17 or newer, 11.1.11 or newer, or 11.2.8 or newer. If using Prisma Access, apply the appropriate patch (11.2.7‑h10 or later for 11.2 on PAN‑OS, 10.2.10‑h28 or later for 10.2 on PAN‑OS).
  • Disable or restrict Terminal Server Agent connections that rely on expired certificates until the patch is applied, or reconfigure the firewall to enforce strict certificate validation.
  • Implement logging and monitoring of terminal server agent authentication events to flag and investigate any use of expired certificates.

Generated by OpenCVE AI on April 18, 2026 at 18:11 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 11 Feb 2026 22:15:00 +0000

Type Values Removed Values Added
First Time appeared Palo Alto Networks cloud Ngfw
Vendors & Products Palo Alto Networks cloud Ngfw

Wed, 11 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 11 Feb 2026 18:15:00 +0000

Type Values Removed Values Added
Description An improper certificate validation vulnerability in PAN-OS allows users to connect Terminal Server Agents on Windows to PAN-OS using expired certificates even if the PAN-OS configuration would not normally permit them to do so.
Title PAN-OS: Improper Validation of Terminal Server Agent Certificate
First Time appeared Palo Alto Networks
Palo Alto Networks pan-os
Palo Alto Networks prisma Access
Weaknesses CWE-295
CPEs cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:10.2.0:*:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:-:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h10:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h11:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h12:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h13:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h14:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h17:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h18:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h1:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h21:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h23:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h26:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h27:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h2:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h3:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h4:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h5:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h6:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h7:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h8:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:h9:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:10.2.11:*:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:10.2.12:*:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:*:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:10.2.14:*:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:10.2.15:*:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:10.2.16:*:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:10.2.1:*:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:10.2.2:*:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:10.2.3:*:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:10.2.4:*:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:10.2.5:*:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:10.2.6:*:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:*:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:10.2.8:*:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:10.2.9:*:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:11.1.0:*:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:11.1.10:*:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:11.1.1:*:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:11.1.2:*:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:11.1.3:*:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:*:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:11.1.5:*:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:*:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:11.1.8:*:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:11.1.9:*:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:11.2.0:*:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:11.2.1:*:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:11.2.2:*:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:11.2.3:*:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:*:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:11.2.5:*:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:11.2.6:*:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:-:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h1:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h2:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h3:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h4:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h7:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:h8:*:*:*:*:*:*
cpe:2.3:o:palo_alto_networks:prisma_access:*:*:*:*:*:PAN-OS:*:*
Vendors & Products Palo Alto Networks
Palo Alto Networks pan-os
Palo Alto Networks prisma Access
References
Metrics cvssV4_0

{'score': 1.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:L/SI:N/SA:N/E:U/AU:N/R:U/V:D/RE:M/U:Amber'}


Subscriptions

Palo Alto Networks Cloud Ngfw Pan-os Prisma Access
cve-icon MITRE

Status: PUBLISHED

Assigner: palo_alto

Published:

Updated: 2026-02-11T19:04:15.415Z

Reserved: 2025-11-03T20:43:49.514Z

Link: CVE-2026-0228

cve-icon Vulnrichment

Updated: 2026-02-11T19:04:11.553Z

cve-icon NVD

Status : Deferred

Published: 2026-02-11T18:16:07.720

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-0228

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T18:15:06Z

Weaknesses