CVE-2026-0228

N/A Unknown

📋 TL;DR

This vulnerability in PAN-OS allows Windows Terminal Server Agents to connect using expired certificates even when the system is configured to reject them. This affects organizations using Palo Alto Networks firewalls with Terminal Server Agent connections from Windows systems.

💻 Affected Systems

Products:
  • PAN-OS
Versions: Specific versions not provided in reference; check vendor advisory for affected versions
Operating Systems: PAN-OS (firewall OS)
Default Config Vulnerable: ✅ No
Notes: Only affects configurations using Terminal Server Agent connections from Windows systems to PAN-OS.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could establish unauthorized connections to PAN-OS using expired certificates, potentially gaining access to firewall management or network traffic.

🟠

Likely Case

Accidental connections using expired certificates that should have been blocked, creating compliance issues and potential security gaps.

🟢

If Mitigated

Limited impact if certificate management is already strict and connections are monitored, though still a policy violation.

🌐 Internet-Facing: MEDIUM - If PAN-OS management interface is exposed to internet, expired certificates could be used for unauthorized access attempts.
🏢 Internal Only: MEDIUM - Internal attackers or compromised systems could use expired certificates to bypass connection controls.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires access to expired certificates and knowledge of Terminal Server Agent configuration.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific fixed versions

Vendor Advisory: https://security.paloaltonetworks.com/CVE-2026-0228

Restart Required: No

Instructions:

1. Check vendor advisory for affected versions. 2. Apply the latest PAN-OS update that addresses this vulnerability. 3. Verify certificate validation is working correctly after update.

🔧 Temporary Workarounds

Disable Terminal Server Agent connections

PAN-OS

Temporarily disable Terminal Server Agent functionality if not required

Strict certificate monitoring

all

Implement additional monitoring and alerting for certificate validation failures

🧯 If You Can't Patch

  • Implement network segmentation to isolate PAN-OS management interfaces
  • Enforce strict certificate lifecycle management and immediate revocation of expired certificates

🔍 How to Verify

Check if Vulnerable:

Check PAN-OS version against vendor advisory and test with expired certificate connection attempts

Check Version:

show system info (on PAN-OS CLI)

Verify Fix Applied:

After patching, attempt to connect with expired certificate and verify connection is rejected

📡 Detection & Monitoring

Log Indicators:

  • Successful connections using certificates near or past expiration date
  • Certificate validation warnings in system logs

Network Indicators:

  • Unexpected Terminal Server Agent connections
  • Connections from systems with expired certificates

SIEM Query:

source="PAN-OS" (certificate_expired OR cert_validation_failed) AND event="connection_successful"

🔗 References

📤 Share & Export