[CIVN-2026-0181] Security Bypass Vulnerability in Palo Alto Cortex XDR Agent

By Published On: April 13, 2026

—–BEGIN PGP SIGNED MESSAGE—–

Hash: SHA256


Security Bypass Vulnerability in Palo Alto Cortex XDR Agent


Indian – Computer Emergency Response Team (https://www.cert-in.org.in)


Severity Rating: HIGH


Software Affected


Cortex XSOAR versions prior to 1.5.52

Cortex XSIAM versions prior to 1.5.52

Overview


A vulnerability has been reported in Palo Alto Networks that allows a remote attacker to bypass cryptographic signature verification in Microsoft Teams integration and gain unauthorized access to the system.


Target Audience:

Large enterprises, Managed Security Service Providers, SOC teams, Cloud Providers and organizations using Cortex XSOAR and XSIAM platforms.


Risk Assessment:

High risk of unauthorised access to sensitive information.


Impact Assessment:

Compromise of integrity and confidentiality.


Description


Palo Alto Networks Cortex XSOAR and Cortex XSIAM are Integrated security platforms that automate and unify threat detection, investigation, and response across the enterprise.


A vulnerability exists in Palo Alto Networks Cortex XSOAR and Cortex XSIAM due to improper verification of cryptographic signatures in Microsoft Teams integration.


Successfully exploitation of this vulnerability could allow a remote attacker to bypass cryptographic signature verification in Microsoft Teams integration and gain unauthorized access to the system.


Solution


Apply appropriate security updates as mentioned in:

https://security.paloaltonetworks.com/CVE-2026-0234



Vendor Information


Palo Alto Networks

https://security.paloaltonetworks.com/CVE-2026-0234


References


Palo Alto Networks

https://security.paloaltonetworks.com/CVE-2026-0234


CVE Name

CVE-2026-0234




– —


Thanks and Regards,

CERT-In


Incident Response Help Desk

e-mail: incident@cert-in.org.in

Phone: +91-11-22902657

Toll Free Number: 1800-11-4949

Toll Free Fax : 1800-11-6969

Web: http://www.cert-in.org.in

PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4

PGP Key information:

https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS


Postal address:

Indian Computer Emergency Response Team (CERT-In)

Ministry of Electronics and Information Technology

Government of India

Electronics Niketan

6, C.G.O. Complex

New Delhi-110 003

—–BEGIN PGP SIGNATURE—–


iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmnc9iAACgkQ3jCgcSdc

ys97OQ//chvP5NPdZPmFZBCBIRvM8IoyX1U8zYr3qNdXjYJi9TsIiYVFVYunBgDZ

/e5sTSKeG7Fo9IgwCs3QERCb+43/sCP8iuykEJeypM+v7tdzAeVtTZk95W6hLIAH

NUfCUUMCpm4BVRJxtWQKLx3maSZZVvFCkm0ISMrFJVl76M9aU9v+bBulwfjlF8an

Bu1/RavMskDY67HypE2g3LvHbdag3E5zbK1TUVyakFBTGax0fOVktjQSohmyPNDV

QXJZCM10PP+iNw8VuiP/mf4s1goWBRA7SVgo3WKsBQruGu1eXc2uZ6ypvMz/xyNc

ItRCekN9cON5gRmGLckJHka3CoFxpq0kNZYodt3oMdDd15xGa+6Om7hrFearyVUC

BQPBq0yE05DTRCFYB8P9bS8sqyfaoD77y93GfWx2DxAzKYIurhNpscawVPJbSxIw

2e4Ilwqnc5kwm8KwYzigr1veEZA5nzCAsHTjaXEew0gC2hrad8fEWw1r8nTzrTYe

qNPF7uprm6VeHVtfJCHZQwy1cxlr8A8u0CKL6vv0q/sbCG2XnXzq/Iav791ZjdS7

bmSFA86o7/PkzoRYtnUkAbVTDksNNxINZPQxXoi+10/oE8rf8CqoCs8eykSoGUd7

EGWJ2JsVIIshJ9pRQzQhLliYTEfUJjaJGQwKQByUbWIg2tJLg0M=

=39j8

—–END PGP SIGNATURE—–

Share this article