Description
A race condition vulnerability in Palo Alto Networks Prisma® Browser enables a locally authenticated non-admin user to bypass certain access and data control policies.
Published: 2026-05-13
Score: 5.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A race condition (CWE-754) in Prisma Browser allows a locally authenticated user without administrative privileges to circumvent configured access and data control policies, potentially exposing sensitive data or allowing unauthorized actions within the controlled environment. This flaw does not provide direct remote code execution but enables policy violations that could affect data confidentiality and integrity.

Affected Systems

The vulnerability affects Palo Alto Networks Prisma Browser on systems that run the software and have users with local, non-admin credentials. No specific version ranges are listed in the current entry; the documented fix is an upgrade to version 146.16.6.165 or later.

Risk and Exploitability

The CVSS base score is 5.8, indicating moderate severity, while the EPSS score is not available and the issue is not listed in CISA’s KEV catalog. Exploitation requires local presence and race-condition timing, making it a local attack vector that could enable a non-admin user to bypass control mechanisms. The lack of remote access requirements reduces broader exposure, but the risk remains significant for environments relying on Prisma Browser for enforcement of access policies.

Generated by OpenCVE AI on May 13, 2026 at 21:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Prisma Browser to version 146.16.6.165 or newer to eliminate the race condition flaw
  • Review and restrict local non-admin user accounts to enforce least-privilege policies, ensuring they have no unnecessary rights to create or modify access controls
  • After updating, re-apply or re-evaluate critical access and data control policies to confirm policy enforcement remains intact

Generated by OpenCVE AI on May 13, 2026 at 21:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 13 May 2026 19:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 13 May 2026 18:30:00 +0000

Type Values Removed Values Added
Description A race condition vulnerability in Palo Alto Networks Prisma® Browser enables a locally authenticated non-admin user to bypass certain access and data control policies.
Title Prisma Browser: Access and Data Rule Bypass
First Time appeared Palo Alto Networks
Palo Alto Networks prisma Browser
Weaknesses CWE-754
CPEs cpe:2.3:a:palo_alto_networks:prisma_browser:*:*:*:*:*:*:*:*
Vendors & Products Palo Alto Networks
Palo Alto Networks prisma Browser
References
Metrics cvssV4_0

{'score': 5.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/AU:N/R:U/V:D/RE:M/U:Amber'}


Subscriptions

Palo Alto Networks Prisma Browser
cve-icon MITRE

Status: PUBLISHED

Assigner: palo_alto

Published:

Updated: 2026-05-14T21:57:43.209Z

Reserved: 2025-11-03T20:43:56.327Z

Link: CVE-2026-0235

cve-icon Vulnrichment

Updated: 2026-05-13T18:58:19.657Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-13T19:16:56.960

Modified: 2026-05-14T16:21:23.190

Link: CVE-2026-0235

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-13T21:30:04Z

Weaknesses