CVE-2026-0228
📋 TL;DR
This vulnerability in PAN-OS allows Windows Terminal Server Agents to connect using expired certificates even when the system is configured to reject them. This affects organizations using Palo Alto Networks firewalls with Terminal Server Agent connections from Windows systems.
💻 Affected Systems
- PAN-OS
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Attackers could establish unauthorized connections to PAN-OS using expired certificates, potentially gaining access to firewall management or network traffic.
Likely Case
Accidental connections using expired certificates that should have been blocked, creating compliance issues and potential security gaps.
If Mitigated
Limited impact if certificate management is already strict and connections are monitored, though still a policy violation.
🎯 Exploit Status
Requires access to expired certificates and knowledge of Terminal Server Agent configuration.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check vendor advisory for specific fixed versions
Vendor Advisory: https://security.paloaltonetworks.com/CVE-2026-0228
Restart Required: No
Instructions:
1. Check vendor advisory for affected versions. 2. Apply the latest PAN-OS update that addresses this vulnerability. 3. Verify certificate validation is working correctly after update.
🔧 Temporary Workarounds
Disable Terminal Server Agent connections
PAN-OSTemporarily disable Terminal Server Agent functionality if not required
Strict certificate monitoring
allImplement additional monitoring and alerting for certificate validation failures
🧯 If You Can't Patch
- Implement network segmentation to isolate PAN-OS management interfaces
- Enforce strict certificate lifecycle management and immediate revocation of expired certificates
🔍 How to Verify
Check if Vulnerable:
Check PAN-OS version against vendor advisory and test with expired certificate connection attempts
Check Version:
show system info (on PAN-OS CLI)
Verify Fix Applied:
After patching, attempt to connect with expired certificate and verify connection is rejected
📡 Detection & Monitoring
Log Indicators:
- Successful connections using certificates near or past expiration date
- Certificate validation warnings in system logs
Network Indicators:
- Unexpected Terminal Server Agent connections
- Connections from systems with expired certificates
SIEM Query:
source="PAN-OS" (certificate_expired OR cert_validation_failed) AND event="connection_successful"