No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://security.paloaltonetworks.com/CVE-2026-0237 |
|
Wed, 13 May 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 13 May 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An improper protection of alternate path vulnerability in Palo Alto Networks Prisma® Browser on macOS fails to properly restrict access to an internal automation bridge. This allows a locally authenticated non-admin user to leverage an exposed communication channel to send unauthorized commands to the browser, bypassing security controls. | |
| Title | Prisma Browser: Improperly Restricted Automation Bridge Allows Security Bypass | |
| First Time appeared |
Palo Alto Networks
Palo Alto Networks prisma Browser |
|
| Weaknesses | CWE-424 | |
| CPEs | cpe:2.3:a:palo_alto_networks:prisma_browser:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Palo Alto Networks
Palo Alto Networks prisma Browser |
|
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: palo_alto
Published:
Updated: 2026-05-13T18:23:57.375Z
Reserved: 2025-11-03T20:43:58.032Z
Link: CVE-2026-0237
Updated: 2026-05-13T18:23:51.231Z
Status : Awaiting Analysis
Published: 2026-05-13T18:16:12.990
Modified: 2026-05-13T18:17:47.830
Link: CVE-2026-0237
No data.
OpenCVE Enrichment
Updated: 2026-05-13T19:30:03Z