CVE-2025-4618

N/A Unknown

📋 TL;DR

A local information disclosure vulnerability in Palo Alto Networks Prisma Browser allows authenticated non-admin users to access sensitive data. This affects organizations using Prisma Browser where local user accounts exist. The vulnerability requires local authentication but not administrative privileges.

💻 Affected Systems

Products:
  • Palo Alto Networks Prisma Browser
Versions: Specific versions not specified in advisory - check vendor documentation
Operating Systems: All platforms running Prisma Browser
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerable when browser self-protection is disabled. Requires local authenticated access to the system.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sensitive organizational data stored in Prisma Browser could be exfiltrated by malicious insiders or compromised local accounts, potentially exposing credentials, configuration data, or other protected information.

🟠

Likely Case

Local users with legitimate access but limited privileges could inadvertently or intentionally view sensitive browser data they shouldn't have access to, leading to data exposure within the organization.

🟢

If Mitigated

With browser self-protection enabled, the vulnerability is mitigated and sensitive data remains protected from unauthorized local access.

🌐 Internet-Facing: LOW - This is a local vulnerability requiring authenticated access to the system running Prisma Browser.
🏢 Internal Only: MEDIUM - Internal users with local accounts on systems running Prisma Browser could exploit this to access sensitive data they shouldn't see.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - Requires local authenticated access but no special privileges

Exploitation requires local access to the system running Prisma Browser. No administrative privileges needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Palo Alto Networks advisory for specific fixed versions

Vendor Advisory: https://security.paloaltonetworks.com/CVE-2025-4618

Restart Required: Yes

Instructions:

1. Review Palo Alto Networks advisory for specific patch versions
2. Update Prisma Browser to recommended version
3. Ensure browser self-protection is enabled after update
4. Restart browser/application as required

🔧 Temporary Workarounds

Enable Browser Self-Protection

all

Enable the built-in browser self-protection feature to mitigate the vulnerability without patching

Check Prisma Browser settings for 'self-protection' or 'security' options and enable them

🧯 If You Can't Patch

  • Enable browser self-protection feature immediately
  • Restrict local user access to systems running Prisma Browser
  • Implement strict access controls and monitoring for local user activities

🔍 How to Verify

Check if Vulnerable:

Check if browser self-protection is disabled in Prisma Browser settings

Check Version:

Check Prisma Browser 'About' or version information in application

Verify Fix Applied:

Verify browser self-protection is enabled and working, or confirm Prisma Browser is updated to patched version

📡 Detection & Monitoring

Log Indicators:

  • Unusual local user access patterns to Prisma Browser
  • Multiple failed attempts to access protected browser data
  • Log entries indicating disabled security features

Network Indicators:

  • Not applicable - local vulnerability

SIEM Query:

Search for events where local non-admin users access Prisma Browser security settings or attempt to disable protections

🔗 References

📤 Share & Export