<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>ASCプログラムドキュメントの記事Frontier AIモデル活用による脆弱性対応プロセス</title>
    <link>https://live.paloaltonetworks.com/t5/asc%E3%83%97%E3%83%AD%E3%82%B0%E3%83%A9%E3%83%A0%E3%83%89%E3%82%AD%E3%83%A5%E3%83%A1%E3%83%B3%E3%83%88/frontier-ai%E3%83%A2%E3%83%87%E3%83%AB%E6%B4%BB%E7%94%A8%E3%81%AB%E3%82%88%E3%82%8B%E8%84%86%E5%BC%B1%E6%80%A7%E5%AF%BE%E5%BF%9C%E3%83%97%E3%83%AD%E3%82%BB%E3%82%B9/ta-p/1253887</link>
    <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;P style="margin: 0in;"&gt;&lt;FONT size="3" color="#000000"&gt;&lt;SPAN&gt;【2026年5月14日付け公開通知サマリー】&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P style="margin: 0in;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV&gt;
&lt;DIV class="gmail_signature" dir="ltr"&gt;
&lt;DIV dir="ltr"&gt;
&lt;DIV dir="ltr"&gt;
&lt;DIV class="gmail_quote"&gt;本日米国時間5月13日&lt;A href="https://security.paloaltonetworks.com/" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://security.paloaltonetworks.com/&amp;amp;source=gmail&amp;amp;ust=1778800065776000&amp;amp;usg=AOvVaw1pviKCLlFoeMjUt4jSKZ3g"&gt;Se&lt;WBR /&gt;curity Advisories&lt;/A&gt;&amp;nbsp;が公開されましたのでご確認ください。&lt;/DIV&gt;
&lt;DIV class="gmail_quote"&gt;&lt;A href="https://security.paloaltonetworks.com/" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://security.paloaltonetworks.com/&amp;amp;source=gmail&amp;amp;ust=1778800065776000&amp;amp;usg=AOvVaw1pviKCLlFoeMjUt4jSKZ3g"&gt;https://security.&lt;WBR /&gt;paloaltonetworks.com/&lt;/A&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="gmail_quote"&gt;(計24件。内訳：HIGH: PAN-OS 3件。MEDIUM: PAN-OS 5件、WF-500/WF-500B 1件、GlobalProtect App 3件、Prisma Access Agent 4件、Prisma SD-WAN 2件、(CyberArk) Trust Protection Foundation 3件、Chronosphere Chronocollector 1件、Prisma Browser 1件。LOW: Broker VM 1件。)&lt;/DIV&gt;
&lt;DIV class="gmail_quote"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="gmail_quote"&gt;PSMからの前メールで案内ありましたように、Frontier AIモデルの活用により弊社製品に潜在する脆弱性の分析・&lt;WBR /&gt;検出を飛躍的に進められるようになりました。プロアクティブに脆弱性対応を行っていく弊社方針により、&lt;WBR /&gt;今後も月次Patch WednesdayのSecurity Advisories公開件数は今回と同等レベルのものが見込ま&lt;WBR /&gt;れます。&lt;/DIV&gt;
&lt;DIV class="gmail_quote"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="gmail_quote"&gt;&lt;STRONG&gt;"Patch Wednesday"について：&lt;/STRONG&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="gmail_quote"&gt;Security&amp;nbsp;&lt;WBR /&gt;Advisoriesは毎月第2水曜日(米国時間)&lt;WBR /&gt;にリリースされます。&lt;WBR /&gt;スケジュールとポリシーに関してはこちらをご覧ください。&amp;nbsp;&lt;BR /&gt;&lt;A href="https://www.paloaltonetworks.com/product-security-assurance" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://www.paloaltonetworks.com/product-security-assurance&amp;amp;source=gmail&amp;amp;ust=1778800065776000&amp;amp;usg=AOvVaw2d1W5KQdfm1is-D2WFKXJh"&gt;https://www.paloaltonetworks.&lt;WBR /&gt;com/product-security-assurance&lt;/A&gt;　&lt;BR /&gt;※緊急性の高い脆弱性(”vulnearabilities with a proof of active exploitation or have potential for active exploitation")に関しては定期スケジュール対象外　&lt;/DIV&gt;
&lt;DIV class="gmail_quote"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ymukae_0-1778717724754.png" style="width: 673px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/71415iBFD701BF410D83D7/image-dimensions/673x322?v=v2" width="673" height="322" role="button" title="ymukae_0-1778717724754.png" alt="ymukae_0-1778717724754.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;STRONG&gt;Security&amp;nbsp;&lt;WBR style="font-family: inherit;" /&gt;Advisories自動送信メールを受け取るためには：&lt;/STRONG&gt;&lt;SPAN&gt;Customer Support Portal (CSP:&amp;nbsp;&lt;/SPAN&gt;&lt;A style="font-family: inherit; background-color: #ffffff;" href="https://support.paloaltonetworks.com/" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://support.paloaltonetworks.com/&amp;amp;source=gmail&amp;amp;ust=1778800065776000&amp;amp;usg=AOvVaw27XsCicr8PBtoU-USW-9zN"&gt;https://support.&lt;WBR /&gt;paloaltonetworks.com&lt;/A&gt;&lt;SPAN&gt;)にログイン後、&lt;/SPAN&gt;&lt;WBR style="font-family: inherit;" /&gt;&lt;SPAN&gt;右上ユーザー名のプルダウンメニューから”&lt;/SPAN&gt;&lt;WBR style="font-family: inherit;" /&gt;&lt;SPAN&gt;Preferences"をお選び頂き、”My Support Notifications"ページの”Subscribe to Product&amp;nbsp;Security&amp;nbsp;Advisories"&lt;/SPAN&gt;&lt;WBR style="font-family: inherit;" /&gt;&lt;SPAN&gt;を選択頂くようお願いします。&lt;/SPAN&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV&gt;
&lt;DIV class="gmail_signature" dir="ltr"&gt;
&lt;DIV dir="ltr"&gt;
&lt;DIV dir="ltr"&gt;
&lt;DIV class="gmail_quote"&gt;
&lt;DIV class="gmail_quote"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ymukae_1-1778717818493.png" style="width: 674px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/71416i66CAB990F3243272/image-dimensions/674x303?v=v2" width="674" height="303" role="button" title="ymukae_1-1778717818493.png" alt="ymukae_1-1778717818493.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="gmail_attr" dir="ltr"&gt;On Wed, May 13, 2026 at 9:17 AM New Palo Alto Networks Security Advisories for May, 2026 &amp;lt;&lt;A href="mailto:updates@paloaltonetworks.com" target="_blank" rel="noopener"&gt;updates@paloaltonetworks.com&lt;/A&gt;&amp;gt; wrote:&lt;/DIV&gt;
&lt;BLOCKQUOTE class="gmail_quote"&gt;
&lt;DIV&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ymukae_2-1778717890388.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/71418iADCDE12E5F741655/image-size/medium?v=v2&amp;amp;px=400" role="button" title="ymukae_2-1778717890388.png" alt="ymukae_2-1778717890388.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;H2&gt;New Palo Alto Networks Security Advisories&lt;/H2&gt;
&lt;DIV&gt;Palo Alto Networks published 24 new security advisories at&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://urldefense.proofpoint.com/v2/url?u=https-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7TwW9dLirq-2D2BIqtdrkZxFgQdzxkI-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal7iviguiBHlx9U689OZT-2D2BeG40pDpk0pbdqdkhKRKnR-2D2BHC2GnyXmoNJer0iJL1lRUHJg6yZeGn98HTVyT0faDSis5Dky2j-2D2F2oHJhJ5DCy0B-2D2FZUM61i2IgBEjczf2a5AsR1A-2D3D-2D3D&amp;amp;d=DwMFAg&amp;amp;c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&amp;amp;r=bCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q&amp;amp;m=ZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4&amp;amp;s=YpBEGDsxVXQpB_eW-9dwuXyYbeD-fjnblClgImpEv3o&amp;amp;e=" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://urldefense.proofpoint.com/v2/url?u%3Dhttps-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7TwW9dLirq-2D2BIqtdrkZxFgQdzxkI-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal7iviguiBHlx9U689OZT-2D2BeG40pDpk0pbdqdkhKRKnR-2D2BHC2GnyXmoNJer0iJL1lRUHJg6yZeGn98HTVyT0faDSis5Dky2j-2D2F2oHJhJ5DCy0B-2D2FZUM61i2IgBEjczf2a5AsR1A-2D3D-2D3D%26d%3DDwMFAg%26c%3DV9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo%26r%3DbCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q%26m%3DZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4%26s%3DYpBEGDsxVXQpB_eW-9dwuXyYbeD-fjnblClgImpEv3o%26e%3D&amp;amp;source=gmail&amp;amp;ust=1778800065776000&amp;amp;usg=AOvVaw3-hJrvVfGFfzXo7oA081Wb"&gt;https://security.&lt;WBR /&gt;paloaltonetworks.com&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;on May 13, 2026:&lt;/DIV&gt;
&lt;BR /&gt;
&lt;DIV&gt;PAN-OS&lt;/DIV&gt;
&lt;HR /&gt;
&lt;DIV&gt;
&lt;DIV&gt;CVE-2026-0265 PAN-OS: Authentication Bypass with Cloud Authentication Service (CAS) enabled (Severity: LOW)&lt;/DIV&gt;
&lt;DIV&gt;&lt;A href="https://urldefense.proofpoint.com/v2/url?u=https-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbNCq99RO8GEC5qWL6JeHB8A-2D3D-2D3DJc-2D-2D-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBalzw28uj1KxPEJlxFGKlDN4v63wkSg4HY960-2D2FJhugt7LMelvdgqcF6hRqUtnUpe-2D2BJ0P-2D2BQlaoO1451HrncE0Z5FXoCUI66vC-2D2FFw80Nuuyl5d5LRqy-2D2FGBXz5q-2D2F-2D2F3BiXe-2D2BzjYA-2D3D-2D3D&amp;amp;d=DwMFAg&amp;amp;c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&amp;amp;r=bCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q&amp;amp;m=ZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4&amp;amp;s=R7B5EvTQObiQvg-3ICTizY4Ci9EoCHkbwWYUzIwQLMA&amp;amp;e=" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://urldefense.proofpoint.com/v2/url?u%3Dhttps-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbNCq99RO8GEC5qWL6JeHB8A-2D3D-2D3DJc-2D-2D-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBalzw28uj1KxPEJlxFGKlDN4v63wkSg4HY960-2D2FJhugt7LMelvdgqcF6hRqUtnUpe-2D2BJ0P-2D2BQlaoO1451HrncE0Z5FXoCUI66vC-2D2FFw80Nuuyl5d5LRqy-2D2FGBXz5q-2D2F-2D2F3BiXe-2D2BzjYA-2D3D-2D3D%26d%3DDwMFAg%26c%3DV9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo%26r%3DbCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q%26m%3DZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4%26s%3DR7B5EvTQObiQvg-3ICTizY4Ci9EoCHkbwWYUzIwQLMA%26e%3D&amp;amp;source=gmail&amp;amp;ust=1778800065776000&amp;amp;usg=AOvVaw2a_mG3HwxhMF9l5hOmdKgc"&gt;https://security.&lt;WBR /&gt;paloaltonetworks.com/CVE-2026-&lt;WBR /&gt;0265&lt;/A&gt;&lt;/DIV&gt;
&lt;BR /&gt;
&lt;DIV&gt;CVE-2026-0264 PAN-OS: Heap-Based Buffer Overflow in DNS Proxy and DNS Server Allows Unauthenticated Remote Code Execution (Severity: MEDIUM)&lt;/DIV&gt;
&lt;DIV&gt;&lt;A href="https://urldefense.proofpoint.com/v2/url?u=https-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbQ76buAw-2D2FP3UVyNyVbxULEQ-2D3D-2D3DrzVD-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal96o1o2ynOEaZoqCAAZn-2D2FPdcCNhdcsZOLUJEGIUIu-2D2BV7dcIoUfQChYQjgzk-2D2FjBx4oM86y7WBpQ6ersOVXk9gkEDcsIzoA5xOCksZXBuA-2D2FxPqcvlP4AuM7m-2D2BOPwfiYUDuVQ-2D3D-2D3D&amp;amp;d=DwMFAg&amp;amp;c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&amp;amp;r=bCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q&amp;amp;m=ZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4&amp;amp;s=dWR2RouKJ79qEQW1frA4B1ElGtRiEHfY_VDSEK1Crpg&amp;amp;e=" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://urldefense.proofpoint.com/v2/url?u%3Dhttps-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbQ76buAw-2D2FP3UVyNyVbxULEQ-2D3D-2D3DrzVD-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal96o1o2ynOEaZoqCAAZn-2D2FPdcCNhdcsZOLUJEGIUIu-2D2BV7dcIoUfQChYQjgzk-2D2FjBx4oM86y7WBpQ6ersOVXk9gkEDcsIzoA5xOCksZXBuA-2D2FxPqcvlP4AuM7m-2D2BOPwfiYUDuVQ-2D3D-2D3D%26d%3DDwMFAg%26c%3DV9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo%26r%3DbCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q%26m%3DZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4%26s%3DdWR2RouKJ79qEQW1frA4B1ElGtRiEHfY_VDSEK1Crpg%26e%3D&amp;amp;source=gmail&amp;amp;ust=1778800065776000&amp;amp;usg=AOvVaw0kXD9ZXhtQMilnPkEvXZlt"&gt;https://security.&lt;WBR /&gt;paloaltonetworks.com/CVE-2026-&lt;WBR /&gt;0264&lt;/A&gt;&lt;/DIV&gt;
&lt;BR /&gt;
&lt;DIV&gt;CVE-2026-0263 PAN-OS: Remote Code Execution (RCE) in IKEv2 Processing (Severity: HIGH)&lt;/DIV&gt;
&lt;DIV&gt;&lt;A href="https://urldefense.proofpoint.com/v2/url?u=https-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbo5RWF7jrgbs0lMI63jSUMA-2D3D-2D3DXsM3-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal61zCnNrvUq2xfAt9rV03digPDzGLxNmnG3fCaboUDnWoyrIjS3UF3UU0s30vtM2srzijjOFmlyL3fOos67eKZMc0cOhkMvQH6cp1IrYfAkrgl92k-2D2BoKQQPtw4do1F-2D2FlDw-2D3D-2D3D&amp;amp;d=DwMFAg&amp;amp;c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&amp;amp;r=bCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q&amp;amp;m=ZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4&amp;amp;s=P4zVdYQ6CEyZjhXutH8Yd9SQqTsiJqY0jF2cSgEffcc&amp;amp;e=" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://urldefense.proofpoint.com/v2/url?u%3Dhttps-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbo5RWF7jrgbs0lMI63jSUMA-2D3D-2D3DXsM3-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal61zCnNrvUq2xfAt9rV03digPDzGLxNmnG3fCaboUDnWoyrIjS3UF3UU0s30vtM2srzijjOFmlyL3fOos67eKZMc0cOhkMvQH6cp1IrYfAkrgl92k-2D2BoKQQPtw4do1F-2D2FlDw-2D3D-2D3D%26d%3DDwMFAg%26c%3DV9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo%26r%3DbCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q%26m%3DZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4%26s%3DP4zVdYQ6CEyZjhXutH8Yd9SQqTsiJqY0jF2cSgEffcc%26e%3D&amp;amp;source=gmail&amp;amp;ust=1778800065776000&amp;amp;usg=AOvVaw1vhl3fKsy2wSr9XUuwPLt2"&gt;https://security.&lt;WBR /&gt;paloaltonetworks.com/CVE-2026-&lt;WBR /&gt;0263&lt;/A&gt;&lt;/DIV&gt;
&lt;BR /&gt;
&lt;DIV&gt;CVE-2026-0262 PAN-OS: Denial of Service Vulnerabilities in Network Traffic Parsing (Severity: MEDIUM)&lt;/DIV&gt;
&lt;DIV&gt;&lt;A href="https://urldefense.proofpoint.com/v2/url?u=https-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbl82KmI2KD5etnus2seaXng-2D3D-2D3D-2Dv1S-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal-2D2Fc2XxcyMYLUnwRpdPfcU28hOprHuWHxkpb8JOKaIO75qf6r5lpwjXKfGRKHtKVvFYH6OTi0TzG7SrJiViBlocrN01DRL8GUFvDIUPnborXbdPcP5h1xGlmZxBpxkYi4dQ-2D3D-2D3D&amp;amp;d=DwMFAg&amp;amp;c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&amp;amp;r=bCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q&amp;amp;m=ZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4&amp;amp;s=8MIJ2v-lv59OkoH40WX5SiFynqokqeM1Tl8PwWjRGDs&amp;amp;e=" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://urldefense.proofpoint.com/v2/url?u%3Dhttps-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbl82KmI2KD5etnus2seaXng-2D3D-2D3D-2Dv1S-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal-2D2Fc2XxcyMYLUnwRpdPfcU28hOprHuWHxkpb8JOKaIO75qf6r5lpwjXKfGRKHtKVvFYH6OTi0TzG7SrJiViBlocrN01DRL8GUFvDIUPnborXbdPcP5h1xGlmZxBpxkYi4dQ-2D3D-2D3D%26d%3DDwMFAg%26c%3DV9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo%26r%3DbCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q%26m%3DZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4%26s%3D8MIJ2v-lv59OkoH40WX5SiFynqokqeM1Tl8PwWjRGDs%26e%3D&amp;amp;source=gmail&amp;amp;ust=1778800065776000&amp;amp;usg=AOvVaw0isN9Ay3uTYN0aL5So6zZu"&gt;https://security.&lt;WBR /&gt;paloaltonetworks.com/CVE-2026-&lt;WBR /&gt;0262&lt;/A&gt;&lt;/DIV&gt;
&lt;BR /&gt;
&lt;DIV&gt;CVE-2026-0261 PAN-OS: Authenticated Admin Command Injection Vulnerability (Severity: MEDIUM)&lt;/DIV&gt;
&lt;DIV&gt;&lt;A href="https://urldefense.proofpoint.com/v2/url?u=https-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbLBPqKe80kH9pjY-2D2ByWN6vYw-2D3D-2D3D5Qcq-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal-2D2BgSxC-2D2F7MYyElcxbXQK2oDx8qragiSvv7TnZ6IVGhN3BH0GVWenolkNcsj5qOdMB54wHGjBurHX7jJqBTJ-2D2FcUAHgxzDY6FbZ8GA7GKShOLc08P-2D2BXM3XfvxC92ZvyDCghCg-2D3D-2D3D&amp;amp;d=DwMFAg&amp;amp;c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&amp;amp;r=bCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q&amp;amp;m=ZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4&amp;amp;s=Qg9R8qTVSkd-ifjGfQplijRdnycqtA3xOcTC4uxvick&amp;amp;e=" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://urldefense.proofpoint.com/v2/url?u%3Dhttps-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbLBPqKe80kH9pjY-2D2ByWN6vYw-2D3D-2D3D5Qcq-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal-2D2BgSxC-2D2F7MYyElcxbXQK2oDx8qragiSvv7TnZ6IVGhN3BH0GVWenolkNcsj5qOdMB54wHGjBurHX7jJqBTJ-2D2FcUAHgxzDY6FbZ8GA7GKShOLc08P-2D2BXM3XfvxC92ZvyDCghCg-2D3D-2D3D%26d%3DDwMFAg%26c%3DV9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo%26r%3DbCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q%26m%3DZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4%26s%3DQg9R8qTVSkd-ifjGfQplijRdnycqtA3xOcTC4uxvick%26e%3D&amp;amp;source=gmail&amp;amp;ust=1778800065776000&amp;amp;usg=AOvVaw0c5_0aKjXnJVfx6phuzxBy"&gt;https://security.&lt;WBR /&gt;paloaltonetworks.com/CVE-2026-&lt;WBR /&gt;0261&lt;/A&gt;&lt;/DIV&gt;
&lt;BR /&gt;
&lt;DIV&gt;CVE-2026-0258 PAN-OS: Server-Side Request Forgery (SSRF) in IKEv2 Certificate URL Fetching (Severity: MEDIUM)&lt;/DIV&gt;
&lt;DIV&gt;&lt;A href="https://urldefense.proofpoint.com/v2/url?u=https-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbtWcxjf98pxmHejkba-2D2Bv2nA-2D3D-2D3DoWOI-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal-2D2BEqn1nRlu5wLZtM6jCRSn2eOVMTn5OPk7w3SSRIqkv4xXUXZ-2D2FkoKG2bp2ElsLj1fCrfgDBIPerf5yt1SeeROC7QVctFlieEm1AdMFBABsBeP3rWY-2D2Bt5DiC4Me9PVw2whw-2D3D-2D3D&amp;amp;d=DwMFAg&amp;amp;c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&amp;amp;r=bCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q&amp;amp;m=ZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4&amp;amp;s=J6eiZ9EtHSE26F6pZW44seVr1-b9ubtfv26HdvBHqSI&amp;amp;e=" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://urldefense.proofpoint.com/v2/url?u%3Dhttps-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbtWcxjf98pxmHejkba-2D2Bv2nA-2D3D-2D3DoWOI-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal-2D2BEqn1nRlu5wLZtM6jCRSn2eOVMTn5OPk7w3SSRIqkv4xXUXZ-2D2FkoKG2bp2ElsLj1fCrfgDBIPerf5yt1SeeROC7QVctFlieEm1AdMFBABsBeP3rWY-2D2Bt5DiC4Me9PVw2whw-2D3D-2D3D%26d%3DDwMFAg%26c%3DV9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo%26r%3DbCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q%26m%3DZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4%26s%3DJ6eiZ9EtHSE26F6pZW44seVr1-b9ubtfv26HdvBHqSI%26e%3D&amp;amp;source=gmail&amp;amp;ust=1778800065776000&amp;amp;usg=AOvVaw091LJ_2vGtMgNLUsLEuC2B"&gt;https://security.&lt;WBR /&gt;paloaltonetworks.com/CVE-2026-&lt;WBR /&gt;0258&lt;/A&gt;&lt;/DIV&gt;
&lt;BR /&gt;
&lt;DIV&gt;CVE-2026-0257 PAN-OS: GlobalProtect Authentication Bypass Vulnerabilities (Severity: MEDIUM)&lt;/DIV&gt;
&lt;DIV&gt;&lt;A href="https://urldefense.proofpoint.com/v2/url?u=https-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbVjUFkP-2D2F8qPR-2D2FgvLZR3kpAw-2D3D-2D3DeP5a-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal7QyIzrkSHZBCHhfoJwQIaTcE94ctNrdMpzu9tpfVlaKRQvE2ZJifnSWkaZwHhKqLNG228m12X2og1VQ4Xi-2D2F7BrTHzpSLzEfGOsaDQWK3t6onhQYclKQ2GlPppl9sJ7rbQ-2D3D-2D3D&amp;amp;d=DwMFAg&amp;amp;c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&amp;amp;r=bCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q&amp;amp;m=ZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4&amp;amp;s=EOu3X0v_RYjxaQ5RNfaWGqLNph958Fn5HqLihrz9pvg&amp;amp;e=" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://urldefense.proofpoint.com/v2/url?u%3Dhttps-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbVjUFkP-2D2F8qPR-2D2FgvLZR3kpAw-2D3D-2D3DeP5a-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal7QyIzrkSHZBCHhfoJwQIaTcE94ctNrdMpzu9tpfVlaKRQvE2ZJifnSWkaZwHhKqLNG228m12X2og1VQ4Xi-2D2F7BrTHzpSLzEfGOsaDQWK3t6onhQYclKQ2GlPppl9sJ7rbQ-2D3D-2D3D%26d%3DDwMFAg%26c%3DV9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo%26r%3DbCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q%26m%3DZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4%26s%3DEOu3X0v_RYjxaQ5RNfaWGqLNph958Fn5HqLihrz9pvg%26e%3D&amp;amp;source=gmail&amp;amp;ust=1778800065776000&amp;amp;usg=AOvVaw1JtZmUhoibITvBSVnVwTwd"&gt;https://security.&lt;WBR /&gt;paloaltonetworks.com/CVE-2026-&lt;WBR /&gt;0257&lt;/A&gt;&lt;/DIV&gt;
&lt;BR /&gt;
&lt;DIV&gt;CVE-2026-0256 PAN-OS: Stored Cross-Site Scripting (XSS) Vulnerability in the Web Interface (Severity: MEDIUM)&lt;/DIV&gt;
&lt;DIV&gt;&lt;A href="https://urldefense.proofpoint.com/v2/url?u=https-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbNWrYR0cQImLnp3d7hTN-2D2F4A-2D3D-2D3DHZqi-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal7yhjEVbQfQDAi-2D2FkuZDiOb0CmWnB1RSuuJuM-2D2FMmNOJ0MKx-2D2Bn0eEGztGKlE6G2l4QZ8Rx-2D2B2xMkOKNlW3MJ8ggQyudFBuMs3iO70dR6UKhw-2D2FtLyu-2D2FGtuDzhdWTJVHsE4ji9g-2D3D-2D3D&amp;amp;d=DwMFAg&amp;amp;c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&amp;amp;r=bCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q&amp;amp;m=ZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4&amp;amp;s=iIMscqV1evcjn2i-GktzPSpRJd4bmrayHB141v0G2gI&amp;amp;e=" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://urldefense.proofpoint.com/v2/url?u%3Dhttps-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbNWrYR0cQImLnp3d7hTN-2D2F4A-2D3D-2D3DHZqi-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal7yhjEVbQfQDAi-2D2FkuZDiOb0CmWnB1RSuuJuM-2D2FMmNOJ0MKx-2D2Bn0eEGztGKlE6G2l4QZ8Rx-2D2B2xMkOKNlW3MJ8ggQyudFBuMs3iO70dR6UKhw-2D2FtLyu-2D2FGtuDzhdWTJVHsE4ji9g-2D3D-2D3D%26d%3DDwMFAg%26c%3DV9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo%26r%3DbCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q%26m%3DZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4%26s%3DiIMscqV1evcjn2i-GktzPSpRJd4bmrayHB141v0G2gI%26e%3D&amp;amp;source=gmail&amp;amp;ust=1778800065776000&amp;amp;usg=AOvVaw3zZ2U0K9SEo2_bSzMDBard"&gt;https://security.&lt;WBR /&gt;paloaltonetworks.com/CVE-2026-&lt;WBR /&gt;0256&lt;/A&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;BR /&gt;
&lt;DIV&gt;WildFire WF-500 and WF-500-B&lt;/DIV&gt;
&lt;HR /&gt;
&lt;DIV&gt;
&lt;DIV&gt;CVE-2026-0259 WildFire WF-500 and WF-500-B: Arbitrary File Read and Delete Vulnerability in WildFire Appliance (WF-500, WF-500-B) (Severity: MEDIUM)&lt;/DIV&gt;
&lt;DIV&gt;&lt;A href="https://urldefense.proofpoint.com/v2/url?u=https-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbfxys1cFQVp-2D2FPCn0-2D2FDxEZWQ-2D3D-2D3DxT8Q-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal0wBtYaiebwMZVO4mg7z52qndhg8bmM3ES8Y-2D2F5s5nZJSNAP0tFM1sjS-2D2B-2D2BmEm6ZZ-2D2BtNB9T9TiEVBFe2P6Q5IZL59i1h91sIaazvyimV-2D2FgUXFe4Rvjy9honC45UneF6-2D2FZ8xg-2D3D-2D3D&amp;amp;d=DwMFAg&amp;amp;c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&amp;amp;r=bCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q&amp;amp;m=ZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4&amp;amp;s=5rfd1h5VkPuP7Offdwml6NQv8jvTzyi4j77Rv0ELbis&amp;amp;e=" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://urldefense.proofpoint.com/v2/url?u%3Dhttps-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbfxys1cFQVp-2D2FPCn0-2D2FDxEZWQ-2D3D-2D3DxT8Q-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal0wBtYaiebwMZVO4mg7z52qndhg8bmM3ES8Y-2D2F5s5nZJSNAP0tFM1sjS-2D2B-2D2BmEm6ZZ-2D2BtNB9T9TiEVBFe2P6Q5IZL59i1h91sIaazvyimV-2D2FgUXFe4Rvjy9honC45UneF6-2D2FZ8xg-2D3D-2D3D%26d%3DDwMFAg%26c%3DV9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo%26r%3DbCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q%26m%3DZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4%26s%3D5rfd1h5VkPuP7Offdwml6NQv8jvTzyi4j77Rv0ELbis%26e%3D&amp;amp;source=gmail&amp;amp;ust=1778800065776000&amp;amp;usg=AOvVaw2J0_AKOpgpgoN9b_x8AdHu"&gt;https://security.&lt;WBR /&gt;paloaltonetworks.com/CVE-2026-&lt;WBR /&gt;0259&lt;/A&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;BR /&gt;
&lt;DIV&gt;GlobalProtect App&lt;/DIV&gt;
&lt;HR /&gt;
&lt;DIV&gt;
&lt;DIV&gt;CVE-2026-0251 GlobalProtect App: Local Privilege Escalation Vulnerabilities (Severity: MEDIUM)&lt;/DIV&gt;
&lt;DIV&gt;&lt;A href="https://urldefense.proofpoint.com/v2/url?u=https-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbAqbkxUN8rzlLby-2D2FEm3YKig-2D3D-2D3D67eB-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal-2D2BWrJ6IkasZmpeETWAQb41GU-2D2BT87xJzeUBMetByoN9P2O3pZIfP8MZop5nqYDpsy7spXDjxOZ951cVrOiszWBcvSB6UQLIOq0LnZSmelZ5m1DVIDXQZpFZPm6pB-2D2F2IgJ5vEWS-2D2B87z09X16IRQxiTTiM-2D3D&amp;amp;d=DwMFAg&amp;amp;c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&amp;amp;r=bCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q&amp;amp;m=ZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4&amp;amp;s=CN-enqh2GXXOmBkEUw56sjeYTyDJ74faWv1kamXB0eI&amp;amp;e=" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://urldefense.proofpoint.com/v2/url?u%3Dhttps-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbAqbkxUN8rzlLby-2D2FEm3YKig-2D3D-2D3D67eB-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal-2D2BWrJ6IkasZmpeETWAQb41GU-2D2BT87xJzeUBMetByoN9P2O3pZIfP8MZop5nqYDpsy7spXDjxOZ951cVrOiszWBcvSB6UQLIOq0LnZSmelZ5m1DVIDXQZpFZPm6pB-2D2F2IgJ5vEWS-2D2B87z09X16IRQxiTTiM-2D3D%26d%3DDwMFAg%26c%3DV9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo%26r%3DbCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q%26m%3DZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4%26s%3DCN-enqh2GXXOmBkEUw56sjeYTyDJ74faWv1kamXB0eI%26e%3D&amp;amp;source=gmail&amp;amp;ust=1778800065776000&amp;amp;usg=AOvVaw15Il5flM8CLMy_qKahkOOc"&gt;https://security.&lt;WBR /&gt;paloaltonetworks.com/CVE-2026-&lt;WBR /&gt;0251&lt;/A&gt;&lt;/DIV&gt;
&lt;BR /&gt;
&lt;DIV&gt;CVE-2026-0250 GlobalProtect App: Buffer Overflow Vulnerability during connection to Portal or Gateway (Severity: MEDIUM)&lt;/DIV&gt;
&lt;DIV&gt;&lt;A href="https://urldefense.proofpoint.com/v2/url?u=https-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbfqWg9tUeIDZ-2D2Fw5s2xgWeNQ-2D3D-2D3DZG0j-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBalwDtplEX5xrcaA-2D2BF5Fds1OwGqE16SxrI-2D2BjoFJUAhmosfXAon0YX8j3tMERtIlAZK3BKZP-2D2F9zhgVbYkML8bGNvSoXZp-2D2FYAznRrnUl277FfgWKsoxOZcsNMaxYdOdwW4aD2aZ7kHW5zoGz8B40ToriKwg-2D3D&amp;amp;d=DwMFAg&amp;amp;c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&amp;amp;r=bCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q&amp;amp;m=ZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4&amp;amp;s=1S9eUgHl-AiCdRjPszZ9JjxUuikhrwA0bbFC3ywC1qQ&amp;amp;e=" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://urldefense.proofpoint.com/v2/url?u%3Dhttps-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbfqWg9tUeIDZ-2D2Fw5s2xgWeNQ-2D3D-2D3DZG0j-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBalwDtplEX5xrcaA-2D2BF5Fds1OwGqE16SxrI-2D2BjoFJUAhmosfXAon0YX8j3tMERtIlAZK3BKZP-2D2F9zhgVbYkML8bGNvSoXZp-2D2FYAznRrnUl277FfgWKsoxOZcsNMaxYdOdwW4aD2aZ7kHW5zoGz8B40ToriKwg-2D3D%26d%3DDwMFAg%26c%3DV9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo%26r%3DbCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q%26m%3DZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4%26s%3D1S9eUgHl-AiCdRjPszZ9JjxUuikhrwA0bbFC3ywC1qQ%26e%3D&amp;amp;source=gmail&amp;amp;ust=1778800065776000&amp;amp;usg=AOvVaw1vnd2SryAcuc-_GYQ-WZrq"&gt;https://security.&lt;WBR /&gt;paloaltonetworks.com/CVE-2026-&lt;WBR /&gt;0250&lt;/A&gt;&lt;/DIV&gt;
&lt;BR /&gt;
&lt;DIV&gt;CVE-2026-0249 GlobalProtect App: Certificate Validation Bypass Vulnerabilities (Severity: MEDIUM)&lt;/DIV&gt;
&lt;DIV&gt;&lt;A href="https://urldefense.proofpoint.com/v2/url?u=https-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbG1SJrSZookYcRda5yTR6rw-2D3D-2D3DAX65-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBalzFefL4ykCGQuVWWe-2D2BicNLZHqppuVFPHA89acZRdypwsq66Lqgc-2D2BLJhzhhrpuTMrtctmSeek7A2pop1j39a-2D2FMCV1CmDfA-2D2FzMkuvTxn-2D2BkjgUVZmCn9OTOm0ursg-2D2ByoyXDadfJgBnEHpSt-2D2BHktT-2D2F-2D2F5Ejg-2D3D&amp;amp;d=DwMFAg&amp;amp;c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&amp;amp;r=bCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q&amp;amp;m=ZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4&amp;amp;s=cr95rW7Y_lSkBvIh1wZkf1z2fE4gZf-YRL5QVmVH4fw&amp;amp;e=" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://urldefense.proofpoint.com/v2/url?u%3Dhttps-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbG1SJrSZookYcRda5yTR6rw-2D3D-2D3DAX65-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBalzFefL4ykCGQuVWWe-2D2BicNLZHqppuVFPHA89acZRdypwsq66Lqgc-2D2BLJhzhhrpuTMrtctmSeek7A2pop1j39a-2D2FMCV1CmDfA-2D2FzMkuvTxn-2D2BkjgUVZmCn9OTOm0ursg-2D2ByoyXDadfJgBnEHpSt-2D2BHktT-2D2F-2D2F5Ejg-2D3D%26d%3DDwMFAg%26c%3DV9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo%26r%3DbCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q%26m%3DZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4%26s%3Dcr95rW7Y_lSkBvIh1wZkf1z2fE4gZf-YRL5QVmVH4fw%26e%3D&amp;amp;source=gmail&amp;amp;ust=1778800065776000&amp;amp;usg=AOvVaw2ZWnCnY1NprqXmkUPAKH9Q"&gt;https://security.&lt;WBR /&gt;paloaltonetworks.com/CVE-2026-&lt;WBR /&gt;0249&lt;/A&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;BR /&gt;
&lt;DIV&gt;Prisma Access Agent&lt;/DIV&gt;
&lt;HR /&gt;
&lt;DIV&gt;
&lt;DIV&gt;CVE-2026-0248 Prisma Access Agent: Improper Certificate Validation Vulnerability (Severity: MEDIUM)&lt;/DIV&gt;
&lt;DIV&gt;&lt;A href="https://urldefense.proofpoint.com/v2/url?u=https-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbwOAhrnNkCsuqYD6O0nRsjw-2D3D-2D3DvIv6-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal6aczu41wTmlJwikp93oHUz2AC5T4xeowFhYIx2nvHOU5eLBRTU6pms6cFmmdiuw0wVvwsWBfjdfXXZ-2D2FEWHoJ6Lp1MSq9y1EmNO7yC6sFSw6XT3pX-2D2F3Xfew5DbzOvbAhMX-2D2FUBdWyP-2D2B84cu4j4icYOdw-2D3D&amp;amp;d=DwMFAg&amp;amp;c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&amp;amp;r=bCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q&amp;amp;m=ZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4&amp;amp;s=pFl3PGN-eDrk9-REalWYnd1lisGDQYnWv0L5N00Kypk&amp;amp;e=" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://urldefense.proofpoint.com/v2/url?u%3Dhttps-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbwOAhrnNkCsuqYD6O0nRsjw-2D3D-2D3DvIv6-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal6aczu41wTmlJwikp93oHUz2AC5T4xeowFhYIx2nvHOU5eLBRTU6pms6cFmmdiuw0wVvwsWBfjdfXXZ-2D2FEWHoJ6Lp1MSq9y1EmNO7yC6sFSw6XT3pX-2D2F3Xfew5DbzOvbAhMX-2D2FUBdWyP-2D2B84cu4j4icYOdw-2D3D%26d%3DDwMFAg%26c%3DV9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo%26r%3DbCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q%26m%3DZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4%26s%3DpFl3PGN-eDrk9-REalWYnd1lisGDQYnWv0L5N00Kypk%26e%3D&amp;amp;source=gmail&amp;amp;ust=1778800065776000&amp;amp;usg=AOvVaw2foFU0z5DGM5HE0A7vSA4K"&gt;https://security.&lt;WBR /&gt;paloaltonetworks.com/CVE-2026-&lt;WBR /&gt;0248&lt;/A&gt;&lt;/DIV&gt;
&lt;BR /&gt;
&lt;DIV&gt;CVE-2026-0247 Prisma Access Agent Endpoint DLP: Authorization Bypass Vulnerabilities (Severity: MEDIUM)&lt;/DIV&gt;
&lt;DIV&gt;&lt;A href="https://urldefense.proofpoint.com/v2/url?u=https-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbgKSpETlkUKiLRT8WaMF36A-2D3D-2D3D9Xrh-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal1m0rq9kGCImgSRO1-2D2BVIBrdgYBF1cRj6kBUDlHBAm1l1ZJ3Nq4bjf3I8RVjk9Pisxa7bpcPCWgeY3-2D2BTE3E3MTc-2D2B5kcTNA2B2BIFfI3LWgV8MfjcP9EjMSmE9r90SConq0-2D2FukV9nWn-2D2FheJj8JYPj0Grs-2D3D&amp;amp;d=DwMFAg&amp;amp;c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&amp;amp;r=bCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q&amp;amp;m=ZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4&amp;amp;s=qCb-nAveEm3uX3KV1j3LbyzMTXbfA5XkdwDxWMxKwlc&amp;amp;e=" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://urldefense.proofpoint.com/v2/url?u%3Dhttps-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbgKSpETlkUKiLRT8WaMF36A-2D3D-2D3D9Xrh-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal1m0rq9kGCImgSRO1-2D2BVIBrdgYBF1cRj6kBUDlHBAm1l1ZJ3Nq4bjf3I8RVjk9Pisxa7bpcPCWgeY3-2D2BTE3E3MTc-2D2B5kcTNA2B2BIFfI3LWgV8MfjcP9EjMSmE9r90SConq0-2D2FukV9nWn-2D2FheJj8JYPj0Grs-2D3D%26d%3DDwMFAg%26c%3DV9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo%26r%3DbCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q%26m%3DZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4%26s%3DqCb-nAveEm3uX3KV1j3LbyzMTXbfA5XkdwDxWMxKwlc%26e%3D&amp;amp;source=gmail&amp;amp;ust=1778800065776000&amp;amp;usg=AOvVaw0Um6_41nRs4RlxbSJxcnfa"&gt;https://security.&lt;WBR /&gt;paloaltonetworks.com/CVE-2026-&lt;WBR /&gt;0247&lt;/A&gt;&lt;/DIV&gt;
&lt;BR /&gt;
&lt;DIV&gt;CVE-2026-0246 Prisma Access Agent: Local Privilege Escalation Vulnerability (Severity: MEDIUM)&lt;/DIV&gt;
&lt;DIV&gt;&lt;A href="https://urldefense.proofpoint.com/v2/url?u=https-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlb-2D2Bdh0NpHb-2D2BNfOcDPa8pl2HA-2D3D-2D3DMwLi-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal93XKX-2D2BzliCViBLsTV3C5IzBmas1B1dYLDWn5BE7YYXRVOKWvw8olH6IDpTeikEPcG-2D2F0ghFoJ9syB3iPX0oyAGhh-2D2BgTz55ajwRfp1-2D2BbS7-2D2F9TvEali5DGYm0lJ96-2D2Fl8lUWY5K4OoPBqqJCDlxd9OLXNg-2D3D&amp;amp;d=DwMFAg&amp;amp;c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&amp;amp;r=bCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q&amp;amp;m=ZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4&amp;amp;s=SMBNnHfMbcCXVoPIx0UBKWV65IwWiFvHRcc5mAaN0Kk&amp;amp;e=" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://urldefense.proofpoint.com/v2/url?u%3Dhttps-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlb-2D2Bdh0NpHb-2D2BNfOcDPa8pl2HA-2D3D-2D3DMwLi-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal93XKX-2D2BzliCViBLsTV3C5IzBmas1B1dYLDWn5BE7YYXRVOKWvw8olH6IDpTeikEPcG-2D2F0ghFoJ9syB3iPX0oyAGhh-2D2BgTz55ajwRfp1-2D2BbS7-2D2F9TvEali5DGYm0lJ96-2D2Fl8lUWY5K4OoPBqqJCDlxd9OLXNg-2D3D%26d%3DDwMFAg%26c%3DV9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo%26r%3DbCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q%26m%3DZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4%26s%3DSMBNnHfMbcCXVoPIx0UBKWV65IwWiFvHRcc5mAaN0Kk%26e%3D&amp;amp;source=gmail&amp;amp;ust=1778800065776000&amp;amp;usg=AOvVaw30pDOJLerxdcdO2raykT9O"&gt;https://security.&lt;WBR /&gt;paloaltonetworks.com/CVE-2026-&lt;WBR /&gt;0246&lt;/A&gt;&lt;/DIV&gt;
&lt;BR /&gt;
&lt;DIV&gt;CVE-2026-0245 Prisma Access Agent: Information Disclosure Vulnerabilities (Severity: MEDIUM)&lt;/DIV&gt;
&lt;DIV&gt;&lt;A href="https://urldefense.proofpoint.com/v2/url?u=https-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbqxtfdXQ7Jbyrn4VIkXimeA-2D3D-2D3D-2DJLM-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal852WQzTJvlAABLkm196XFrDuEr90eQY0SzQjraMFHP1kynFdmPNgSnZs4ZQyHBULk6OHYkdduZJoLxzkfMtpyG-2D2BUq2Qt5nDI8HJ4Vg4S1GSDBYOOPEOQJWsLSF-2D2F3spRMz0-2D2FM7niz-2D2Fxn7o5mjB5vMCs-2D3D&amp;amp;d=DwMFAg&amp;amp;c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&amp;amp;r=bCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q&amp;amp;m=ZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4&amp;amp;s=YPIC1-Pt2BnUxjvMK6wg6o4iJwLza8HmIWS_OZotg34&amp;amp;e=" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://urldefense.proofpoint.com/v2/url?u%3Dhttps-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbqxtfdXQ7Jbyrn4VIkXimeA-2D3D-2D3D-2DJLM-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal852WQzTJvlAABLkm196XFrDuEr90eQY0SzQjraMFHP1kynFdmPNgSnZs4ZQyHBULk6OHYkdduZJoLxzkfMtpyG-2D2BUq2Qt5nDI8HJ4Vg4S1GSDBYOOPEOQJWsLSF-2D2F3spRMz0-2D2FM7niz-2D2Fxn7o5mjB5vMCs-2D3D%26d%3DDwMFAg%26c%3DV9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo%26r%3DbCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q%26m%3DZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4%26s%3DYPIC1-Pt2BnUxjvMK6wg6o4iJwLza8HmIWS_OZotg34%26e%3D&amp;amp;source=gmail&amp;amp;ust=1778800065776000&amp;amp;usg=AOvVaw05BUL8k8ZdEifZF_YzyFY2"&gt;https://security.&lt;WBR /&gt;paloaltonetworks.com/CVE-2026-&lt;WBR /&gt;0245&lt;/A&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;BR /&gt;
&lt;DIV&gt;Prisma SD-WAN ION&lt;/DIV&gt;
&lt;HR /&gt;
&lt;DIV&gt;
&lt;DIV&gt;CVE-2026-0244 Prisma SD-WAN: Improper Certificate Validation Vulnerability (Severity: MEDIUM)&lt;/DIV&gt;
&lt;DIV&gt;&lt;A href="https://urldefense.proofpoint.com/v2/url?u=https-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlb9LJNxBq3pKde-2D2FkOBUnpozg-2D3D-2D3D29VF-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal1xgZqjJMtiQrpEIjfypRr9VPgNZKqd9MrQZcqAVMTRAGfhtGaHteM11Jf9JmRuq74DweI8hMDmSbKCTZWyBtEg7kGkNqqHMWrt2oQgo55u2fQd2cvcHWAgYpdY38r4XnqICHf-2D2BQVGEdaDJbr-2D2FbdaUw-2D3D&amp;amp;d=DwMFAg&amp;amp;c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&amp;amp;r=bCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q&amp;amp;m=ZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4&amp;amp;s=Sjxy5s238ra8fA6zOzM3CP_Tpxl1MYEG19WEzLt40jY&amp;amp;e=" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://urldefense.proofpoint.com/v2/url?u%3Dhttps-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlb9LJNxBq3pKde-2D2FkOBUnpozg-2D3D-2D3D29VF-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal1xgZqjJMtiQrpEIjfypRr9VPgNZKqd9MrQZcqAVMTRAGfhtGaHteM11Jf9JmRuq74DweI8hMDmSbKCTZWyBtEg7kGkNqqHMWrt2oQgo55u2fQd2cvcHWAgYpdY38r4XnqICHf-2D2BQVGEdaDJbr-2D2FbdaUw-2D3D%26d%3DDwMFAg%26c%3DV9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo%26r%3DbCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q%26m%3DZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4%26s%3DSjxy5s238ra8fA6zOzM3CP_Tpxl1MYEG19WEzLt40jY%26e%3D&amp;amp;source=gmail&amp;amp;ust=1778800065776000&amp;amp;usg=AOvVaw2p6I1maKukrQnpkGQCf8Ud"&gt;https://security.&lt;WBR /&gt;paloaltonetworks.com/CVE-2026-&lt;WBR /&gt;0244&lt;/A&gt;&lt;/DIV&gt;
&lt;BR /&gt;
&lt;DIV&gt;CVE-2026-0243 Prisma SD-WAN: Denial of Service (DoS) Vulnerability Through IPv6 Crafted Packet (Severity: MEDIUM)&lt;/DIV&gt;
&lt;DIV&gt;&lt;A href="https://urldefense.proofpoint.com/v2/url?u=https-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbeYHEYavDqxTkUDmlDt2Q8g-2D3D-2D3DCIgm-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal-2D2BSckwQzNuhQjUguUuPsYi-2D2BV5E-2D2F0pdVE-2D2FO5UW6vZdGF7SF7qDiIuGSYAOwwNjvgEcqqdF2lu-2D2BzFiXFHOtrBx3coatYDDm4wsgevbX7PFHiGyNoKHVYlvulsbqZrdr7PPOmIZ214-2D2BJVPgR1RMEscqNz8-2D3D&amp;amp;d=DwMFAg&amp;amp;c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&amp;amp;r=bCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q&amp;amp;m=ZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4&amp;amp;s=7rURJ8yu4mQPSAEEL9UrJpKxFRPqBdBKu1QrylytPYo&amp;amp;e=" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://urldefense.proofpoint.com/v2/url?u%3Dhttps-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbeYHEYavDqxTkUDmlDt2Q8g-2D3D-2D3DCIgm-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal-2D2BSckwQzNuhQjUguUuPsYi-2D2BV5E-2D2F0pdVE-2D2FO5UW6vZdGF7SF7qDiIuGSYAOwwNjvgEcqqdF2lu-2D2BzFiXFHOtrBx3coatYDDm4wsgevbX7PFHiGyNoKHVYlvulsbqZrdr7PPOmIZ214-2D2BJVPgR1RMEscqNz8-2D3D%26d%3DDwMFAg%26c%3DV9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo%26r%3DbCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q%26m%3DZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4%26s%3D7rURJ8yu4mQPSAEEL9UrJpKxFRPqBdBKu1QrylytPYo%26e%3D&amp;amp;source=gmail&amp;amp;ust=1778800065776000&amp;amp;usg=AOvVaw1fpf37-B6nw6-_kvGNmPoK"&gt;https://security.&lt;WBR /&gt;paloaltonetworks.com/CVE-2026-&lt;WBR /&gt;0243&lt;/A&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;BR /&gt;
&lt;DIV&gt;Trust Protection Foundation&lt;/DIV&gt;
&lt;HR /&gt;
&lt;DIV&gt;
&lt;DIV&gt;CVE-2026-0242 Trust Protection Foundation: SQL Injection Vulnerability (Severity: MEDIUM)&lt;/DIV&gt;
&lt;DIV&gt;&lt;A href="https://urldefense.proofpoint.com/v2/url?u=https-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbVhMm-2D2BQJ2Ob-2D2BN-2D2FMeIr231sQ-2D3D-2D3D3rSm-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBalw5QlNbSaf7CQZq5dmCUZsaMrxtBJ2u9F5l7tejZVo6RLi6R6ednVB4TVZe86FdoeX-2D2BqyFpKHqoTuBf5a0FGRu0SrwI9nFjGyzx2ftYJUDh900hE0LFWEEPm8YzRiGqFdIEFN6f4IKE-2D2B7UUZgHeZN9U-2D3D&amp;amp;d=DwMFAg&amp;amp;c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&amp;amp;r=bCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q&amp;amp;m=ZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4&amp;amp;s=JllnQ_SG583dTm9cbc91PRWTpqrCImtKw1Y7MkcZkGs&amp;amp;e=" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://urldefense.proofpoint.com/v2/url?u%3Dhttps-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbVhMm-2D2BQJ2Ob-2D2BN-2D2FMeIr231sQ-2D3D-2D3D3rSm-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBalw5QlNbSaf7CQZq5dmCUZsaMrxtBJ2u9F5l7tejZVo6RLi6R6ednVB4TVZe86FdoeX-2D2BqyFpKHqoTuBf5a0FGRu0SrwI9nFjGyzx2ftYJUDh900hE0LFWEEPm8YzRiGqFdIEFN6f4IKE-2D2B7UUZgHeZN9U-2D3D%26d%3DDwMFAg%26c%3DV9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo%26r%3DbCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q%26m%3DZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4%26s%3DJllnQ_SG583dTm9cbc91PRWTpqrCImtKw1Y7MkcZkGs%26e%3D&amp;amp;source=gmail&amp;amp;ust=1778800065776000&amp;amp;usg=AOvVaw01aWK_4o7RmerxcrEz35kr"&gt;https://security.&lt;WBR /&gt;paloaltonetworks.com/CVE-2026-&lt;WBR /&gt;0242&lt;/A&gt;&lt;/DIV&gt;
&lt;BR /&gt;
&lt;DIV&gt;CVE-2026-0241 Trust Protection Foundation: Multiple Authorization Bypass Vulnerabilities (Severity: MEDIUM)&lt;/DIV&gt;
&lt;DIV&gt;&lt;A href="https://urldefense.proofpoint.com/v2/url?u=https-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlb-2D2BdKOAzmjIT2iIc1-2D2BiEXKhA-2D3D-2D3Dpk1O-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBaly5hdCDPGJKxlx6ivawpCN-2D2B0jgWZDR-2D2BdtVLkCPVSD0v-2D2FLuoDQAhO-2D2FeDZy7npyVpRdHsNSI8TyktsyMZ6z3lBCf1kj1DZF5BXg5u65D641PpzDl8Ngk0gGpRJGi9zzMpQmLDcLauueoMYV6Fc92-2D2FrWnM-2D3D&amp;amp;d=DwMFAg&amp;amp;c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&amp;amp;r=bCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q&amp;amp;m=ZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4&amp;amp;s=HKXyC2TL01qdteLKF1CdMCw8xzMHZKfa_DxA4zj9XhE&amp;amp;e=" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://urldefense.proofpoint.com/v2/url?u%3Dhttps-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlb-2D2BdKOAzmjIT2iIc1-2D2BiEXKhA-2D3D-2D3Dpk1O-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBaly5hdCDPGJKxlx6ivawpCN-2D2B0jgWZDR-2D2BdtVLkCPVSD0v-2D2FLuoDQAhO-2D2FeDZy7npyVpRdHsNSI8TyktsyMZ6z3lBCf1kj1DZF5BXg5u65D641PpzDl8Ngk0gGpRJGi9zzMpQmLDcLauueoMYV6Fc92-2D2FrWnM-2D3D%26d%3DDwMFAg%26c%3DV9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo%26r%3DbCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q%26m%3DZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4%26s%3DHKXyC2TL01qdteLKF1CdMCw8xzMHZKfa_DxA4zj9XhE%26e%3D&amp;amp;source=gmail&amp;amp;ust=1778800065776000&amp;amp;usg=AOvVaw0G0mDeh1mkALvrZP6324dm"&gt;https://security.&lt;WBR /&gt;paloaltonetworks.com/CVE-2026-&lt;WBR /&gt;0241&lt;/A&gt;&lt;/DIV&gt;
&lt;BR /&gt;
&lt;DIV&gt;CVE-2026-0240 Trust Protection Foundation: Sensitive Information Disclosure Vulnerability (Severity: MEDIUM)&lt;/DIV&gt;
&lt;DIV&gt;&lt;A href="https://urldefense.proofpoint.com/v2/url?u=https-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbPLkjQo9tS88DScAyqmxuig-2D3D-2D3Dm7EF-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal8nhYNe487fB4GYjet7RZ-2D2FQ07bd2Z9g3tuGiHiDDh8aSVq-2D2B3CSTAvnRQ6GBsQ4HMiTKLsNk1rMQUC3r-2D2BTZtCS4P3hk0AEanZJPcRFXLORLm99iqzGaYrqWxMaewUkzKeTmnd8eiFOm8xYtpAqqgtFKo-2D3D&amp;amp;d=DwMFAg&amp;amp;c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&amp;amp;r=bCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q&amp;amp;m=ZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4&amp;amp;s=fArdCGl9l8KtmeXMvSQN19v61r2aGN6VPDHeshPTBcY&amp;amp;e=" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://urldefense.proofpoint.com/v2/url?u%3Dhttps-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbPLkjQo9tS88DScAyqmxuig-2D3D-2D3Dm7EF-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal8nhYNe487fB4GYjet7RZ-2D2FQ07bd2Z9g3tuGiHiDDh8aSVq-2D2B3CSTAvnRQ6GBsQ4HMiTKLsNk1rMQUC3r-2D2BTZtCS4P3hk0AEanZJPcRFXLORLm99iqzGaYrqWxMaewUkzKeTmnd8eiFOm8xYtpAqqgtFKo-2D3D%26d%3DDwMFAg%26c%3DV9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo%26r%3DbCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q%26m%3DZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4%26s%3DfArdCGl9l8KtmeXMvSQN19v61r2aGN6VPDHeshPTBcY%26e%3D&amp;amp;source=gmail&amp;amp;ust=1778800065776000&amp;amp;usg=AOvVaw0BjocNp7aZKl15fa7oSAn5"&gt;https://security.&lt;WBR /&gt;paloaltonetworks.com/CVE-2026-&lt;WBR /&gt;0240&lt;/A&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;BR /&gt;
&lt;DIV&gt;Chronosphere Chronocollector&lt;/DIV&gt;
&lt;HR /&gt;
&lt;DIV&gt;
&lt;DIV&gt;CVE-2026-0239 Chronosphere Chronocollector Information Disclosure Vulnerability (Severity: MEDIUM)&lt;/DIV&gt;
&lt;DIV&gt;&lt;A href="https://urldefense.proofpoint.com/v2/url?u=https-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbWpRssn0fpqGAQb3BTCYzhA-2D3D-2D3Du3Ad-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal-2D2FGPo-2D2B4Ji7vDdIMvapMgYJP-2D2BLPQjiqdUr6qdsITf5zT18gBuId-2D2FhzzeQSaYANv3T3sxtjS5c4SoxyN-2D2FCf-2D2BGkIZWOIZLIozuTEWhHzNDAgdJqWmazg0qvNpFQUZEkWNE1wWwax5elcRf-2D2BTmvIkGIinIU-2D3D&amp;amp;d=DwMFAg&amp;amp;c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&amp;amp;r=bCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q&amp;amp;m=ZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4&amp;amp;s=5t7HntYa0PxE6Sk-w3B4cFsU6TvktJAqgtxfMUimYlY&amp;amp;e=" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://urldefense.proofpoint.com/v2/url?u%3Dhttps-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbWpRssn0fpqGAQb3BTCYzhA-2D3D-2D3Du3Ad-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal-2D2FGPo-2D2B4Ji7vDdIMvapMgYJP-2D2BLPQjiqdUr6qdsITf5zT18gBuId-2D2FhzzeQSaYANv3T3sxtjS5c4SoxyN-2D2FCf-2D2BGkIZWOIZLIozuTEWhHzNDAgdJqWmazg0qvNpFQUZEkWNE1wWwax5elcRf-2D2BTmvIkGIinIU-2D3D%26d%3DDwMFAg%26c%3DV9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo%26r%3DbCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q%26m%3DZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4%26s%3D5t7HntYa0PxE6Sk-w3B4cFsU6TvktJAqgtxfMUimYlY%26e%3D&amp;amp;source=gmail&amp;amp;ust=1778800065776000&amp;amp;usg=AOvVaw34qIVoW5avmmKWNxtwEpYa"&gt;https://security.&lt;WBR /&gt;paloaltonetworks.com/CVE-2026-&lt;WBR /&gt;0239&lt;/A&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;BR /&gt;
&lt;DIV&gt;Broker VM&lt;/DIV&gt;
&lt;HR /&gt;
&lt;DIV&gt;
&lt;DIV&gt;CVE-2026-0238 Broker VM: Improper Input Validation in Broker VM Certificate and Key Fields (Severity: LOW)&lt;/DIV&gt;
&lt;DIV&gt;&lt;A href="https://urldefense.proofpoint.com/v2/url?u=https-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbYKILQKOxXoaEURIFLmQv1w-2D3D-2D3DyyuQ-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBalwr1GASaWEdjMV6F5iIGO-2D2FHKW9bMWRi7pItrJVq9KOTDDxeLiM2GNKqhd42nqNk4gj-2D2F0a1A5WjB-2D2BXt8-2D2BvGcaGkFP2Uqk05uVn-2D2Bm5hP8bFkkwihsjOXqeYSMNVjNIpOYtW-2D2F7ItHfoXZ2cPq6oSKQDzW0-2D3D&amp;amp;d=DwMFAg&amp;amp;c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&amp;amp;r=bCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q&amp;amp;m=ZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4&amp;amp;s=UT84TDR-TBX1rC0DOXI-BfDRQggJVx5gZbIQc_lidDs&amp;amp;e=" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://urldefense.proofpoint.com/v2/url?u%3Dhttps-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbYKILQKOxXoaEURIFLmQv1w-2D3D-2D3DyyuQ-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBalwr1GASaWEdjMV6F5iIGO-2D2FHKW9bMWRi7pItrJVq9KOTDDxeLiM2GNKqhd42nqNk4gj-2D2F0a1A5WjB-2D2BXt8-2D2BvGcaGkFP2Uqk05uVn-2D2Bm5hP8bFkkwihsjOXqeYSMNVjNIpOYtW-2D2F7ItHfoXZ2cPq6oSKQDzW0-2D3D%26d%3DDwMFAg%26c%3DV9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo%26r%3DbCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q%26m%3DZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4%26s%3DUT84TDR-TBX1rC0DOXI-BfDRQggJVx5gZbIQc_lidDs%26e%3D&amp;amp;source=gmail&amp;amp;ust=1778800065776000&amp;amp;usg=AOvVaw3JFtuFN8dRTw0rXr8LnajI"&gt;https://security.&lt;WBR /&gt;paloaltonetworks.com/CVE-2026-&lt;WBR /&gt;0238&lt;/A&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;BR /&gt;
&lt;DIV&gt;Prisma Browser&lt;/DIV&gt;
&lt;HR /&gt;
&lt;DIV&gt;
&lt;DIV&gt;PAN-SA-2026-0007 Chromium and Prisma Browser: Monthly Vulnerability Update (May 2026) (Severity: MEDIUM)&lt;/DIV&gt;
&lt;DIV&gt;&lt;A href="https://urldefense.proofpoint.com/v2/url?u=https-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7TUinpGHGDwh5yfIb3rN1l-2D2FIaUNzeAF-2D2BrIPgIrXWtzYQg-2D3D-2D3DdRkQ-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal-2D2B-2D2F9b2U1U6ajCibiAX5ArkQrqQ15R2k4J5dypTY2jKoPkW-2D2B-2D2BczO2NUXG-2D2FbSvuravuUX5ux1qascQbXRUzg3pi9nNkPST5-2D2BLzL054ZSF6n30A362yiI-2D2FIHKgiC5adjO-2D2FNMpUxftrBW7q6nw0pSU3Jv2M-2D3D&amp;amp;d=DwMFAg&amp;amp;c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&amp;amp;r=bCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q&amp;amp;m=ZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4&amp;amp;s=zwSsCeUlrVgB8gC0SPdHrdjubvllTdS1dYu16P3-fl8&amp;amp;e=" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://urldefense.proofpoint.com/v2/url?u%3Dhttps-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7TUinpGHGDwh5yfIb3rN1l-2D2FIaUNzeAF-2D2BrIPgIrXWtzYQg-2D3D-2D3DdRkQ-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal-2D2B-2D2F9b2U1U6ajCibiAX5ArkQrqQ15R2k4J5dypTY2jKoPkW-2D2B-2D2BczO2NUXG-2D2FbSvuravuUX5ux1qascQbXRUzg3pi9nNkPST5-2D2BLzL054ZSF6n30A362yiI-2D2FIHKgiC5adjO-2D2FNMpUxftrBW7q6nw0pSU3Jv2M-2D3D%26d%3DDwMFAg%26c%3DV9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo%26r%3DbCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q%26m%3DZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4%26s%3DzwSsCeUlrVgB8gC0SPdHrdjubvllTdS1dYu16P3-fl8%26e%3D&amp;amp;source=gmail&amp;amp;ust=1778800065776000&amp;amp;usg=AOvVaw1PJJVi3oRo4rbMD2eMWsX5"&gt;https://security.&lt;WBR /&gt;paloaltonetworks.com/PAN-SA-&lt;WBR /&gt;2026-0007&lt;/A&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;BR /&gt;
&lt;DIV&gt;Please visit our Security Advisories website to learn more at&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://urldefense.proofpoint.com/v2/url?u=https-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7TwW9dLirq-2D2BIqtdrkZxFgQdKjJT-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal-2D2FF3R9CA65GGZe-2D2FJBKrXth0geqsfpZUNyeElSzNDuRW0hUC4Wf1hXknDbyOBo2sg6HdY-2D2Bo9qpMDlSHqQo45uq1k9SUJp4Vqg6n19HgfXzFmV9JWH1KpzIwLD64vcnm39XXxgv8XhQY6jD6qYCxO79go-2D3D&amp;amp;d=DwMFAg&amp;amp;c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&amp;amp;r=bCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q&amp;amp;m=ZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4&amp;amp;s=f6jdHCazWrtaGMIAoZrGb58cdmIcf_7ErYIXZ2SK2v4&amp;amp;e=" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://urldefense.proofpoint.com/v2/url?u%3Dhttps-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7TwW9dLirq-2D2BIqtdrkZxFgQdKjJT-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal-2D2FF3R9CA65GGZe-2D2FJBKrXth0geqsfpZUNyeElSzNDuRW0hUC4Wf1hXknDbyOBo2sg6HdY-2D2Bo9qpMDlSHqQo45uq1k9SUJp4Vqg6n19HgfXzFmV9JWH1KpzIwLD64vcnm39XXxgv8XhQY6jD6qYCxO79go-2D3D%26d%3DDwMFAg%26c%3DV9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo%26r%3DbCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q%26m%3DZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4%26s%3Df6jdHCazWrtaGMIAoZrGb58cdmIcf_7ErYIXZ2SK2v4%26e%3D&amp;amp;source=gmail&amp;amp;ust=1778800065776000&amp;amp;usg=AOvVaw0zjrMT0zHcfeLBhi57HAW-"&gt;https://security.&lt;WBR /&gt;paloaltonetworks.com/&lt;/A&gt;.&lt;BR /&gt;If you have questions, please contact support&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://urldefense.proofpoint.com/v2/url?u=https-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.-2D2FB-2D2FSv-2D2FLOd4gvRdvIcMQeAaN-2D2F-2D2FPS8i6KvsOG4J7cRzEiYh4Kb9qe13uaA7TgIOI4V8eiV4IPjNGQzGe1MBcaqmA-2D3D-2D3DvVbi-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal9q7NTP4IshR9qVXhI2ODDp-2D2FrcjFzHoSU8Uw7XCJoiMsB-2D2Biz1KjhI04qy1Xd5jETiGajWLjf0sDdRWxFFfBHZeJqv-2D2F22-2D2Fo3eObUOmeSo4xTK53KVaFFj4d6gAnzbjIbR-2D2FF4T8NOpq7yvIJEfw-2D2B5Lqsc-2D3D&amp;amp;d=DwMFAg&amp;amp;c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&amp;amp;r=bCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q&amp;amp;m=ZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4&amp;amp;s=h9mCqVdf5h7UrkhqpjvY_wmXUXdlXP9nuReabGGIeP8&amp;amp;e=" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://urldefense.proofpoint.com/v2/url?u%3Dhttps-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.-2D2FB-2D2FSv-2D2FLOd4gvRdvIcMQeAaN-2D2F-2D2FPS8i6KvsOG4J7cRzEiYh4Kb9qe13uaA7TgIOI4V8eiV4IPjNGQzGe1MBcaqmA-2D3D-2D3DvVbi-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal9q7NTP4IshR9qVXhI2ODDp-2D2FrcjFzHoSU8Uw7XCJoiMsB-2D2Biz1KjhI04qy1Xd5jETiGajWLjf0sDdRWxFFfBHZeJqv-2D2F22-2D2Fo3eObUOmeSo4xTK53KVaFFj4d6gAnzbjIbR-2D2FF4T8NOpq7yvIJEfw-2D2B5Lqsc-2D3D%26d%3DDwMFAg%26c%3DV9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo%26r%3DbCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q%26m%3DZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4%26s%3Dh9mCqVdf5h7UrkhqpjvY_wmXUXdlXP9nuReabGGIeP8%26e%3D&amp;amp;source=gmail&amp;amp;ust=1778800065777000&amp;amp;usg=AOvVaw3d9mfuQbbGHHsJrgIkXYUH"&gt;https://www.paloaltonetworks.&lt;WBR /&gt;com/company/contact-support&lt;/A&gt;.&lt;/DIV&gt;
&lt;BR /&gt;
&lt;DIV&gt;Regards,&lt;/DIV&gt;
&lt;DIV&gt;Product Security Incident Response Team&lt;/DIV&gt;
&lt;DIV&gt;Palo Alto Networks&lt;/DIV&gt;
&lt;BR /&gt;
&lt;DIV&gt;This email was sent to you because you are a registered user of the Palo Alto Networks Support Portal. If you no longer wish to receive these updates, please unsubscribe by updating your profile on the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://urldefense.proofpoint.com/v2/url?u=https-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgM5sHDIzn0MQWLf76DXH0s7oO36I1EagGKlHT50TnnM9SxWXEf7esrSEM2J1IKkIqWT0pviUSg1rJMr3TO-2D2BPseM-2D3DzkQo-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal6rSBoE4bo5EgWX3MV7nU28-2D2Fkjp2HGJjTVx4iOFEt0BYekb7oTUBxvjVJ0mYFpXNpkJWCjIR5HAbX2kIRCxNCVN-2D2Fh-2D2FuAba06ASTbiEsNIiU0taIKGBJNhCYGqiS2W7z5Rqd2b3mLbp-2D2BEDrteaTHm0RA-2D3D&amp;amp;d=DwMFAg&amp;amp;c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&amp;amp;r=bCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q&amp;amp;m=ZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4&amp;amp;s=lzGFJz1tWO00hpB0A0X0oNUyqIqUOqNXPYcwKoIEbwI&amp;amp;e=" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://urldefense.proofpoint.com/v2/url?u%3Dhttps-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgM5sHDIzn0MQWLf76DXH0s7oO36I1EagGKlHT50TnnM9SxWXEf7esrSEM2J1IKkIqWT0pviUSg1rJMr3TO-2D2BPseM-2D3DzkQo-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal6rSBoE4bo5EgWX3MV7nU28-2D2Fkjp2HGJjTVx4iOFEt0BYekb7oTUBxvjVJ0mYFpXNpkJWCjIR5HAbX2kIRCxNCVN-2D2Fh-2D2FuAba06ASTbiEsNIiU0taIKGBJNhCYGqiS2W7z5Rqd2b3mLbp-2D2BEDrteaTHm0RA-2D3D%26d%3DDwMFAg%26c%3DV9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo%26r%3DbCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q%26m%3DZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4%26s%3DlzGFJz1tWO00hpB0A0X0oNUyqIqUOqNXPYcwKoIEbwI%26e%3D&amp;amp;source=gmail&amp;amp;ust=1778800065777000&amp;amp;usg=AOvVaw2c7KL-iaYvhJwrZ4hFkPyP"&gt;Support Portal&lt;/A&gt;.&lt;/DIV&gt;
&lt;/BLOCKQUOTE&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P style="margin: 0in;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in;"&gt;&lt;FONT size="3" color="#000000"&gt;&lt;SPAN&gt;【2026年5月13日付け全パートナー向け同報周知：事前告知】&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P style="margin: 0in;"&gt;&lt;FONT size="3" color="#000000"&gt;&lt;SPAN&gt;日本時間の2026年5月14日 (木) 午前1時 (太平洋夏時間: 5月13日 水曜 午前9時) に、弊社より8つの製品群にわたる合計26件のCVEに関する &lt;/SPAN&gt;&lt;A href="https://security.paloaltonetworks.com/" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;Palo Alto Networks Security Advisory &lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;を公開いたします 。関連する公開情報やASCパートナー各社様の支援が求められるスコープが明確になり次第、当スレッドおよびJapan LIVE CommunityのASC向け特設ページでPSM/PSAMが統一窓口となってアップデートさせていただく計画です。&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: 游ゴシック; font-size: 11.0pt; color: blue;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: 'Google Sans Text'; font-size: 11.0pt; color: blue;"&gt;&lt;STRONG&gt;&lt;FONT size="3" color="#000000"&gt;■ 本アドバイザリ公開の背景と目的&amp;nbsp;&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: 'Google Sans Text'; font-size: 11.0pt; color: blue;"&gt;&lt;FONT size="3" color="#000000"&gt;&lt;SPAN&gt;今回の多数の脆弱性公開は、Anthropic社の「Claude Mythos」をはじめとする最先端のAIモデルを弊社のコードベースに適用し、プロアクティブなディスカバリー（発見）を行った結果によるものです 。高度なAI機能が攻撃者に広く悪用される前に、弊社が先手を打って脆弱性を特定・修正し、お客様の環境を「AIによって強固に守られた状態 (AI-hardened)」にすることを目的としております 。&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: 游ゴシック; font-size: 11.0pt; color: blue;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: 'Google Sans Text'; font-size: 11.0pt; color: blue;"&gt;&lt;STRONG&gt;&lt;FONT size="3" color="#000000"&gt;■ エンドユーザー様へ周知いただきたい「3つの重要事実」&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: 'Google Sans Text'; font-size: 11.0pt; color: blue;"&gt;&lt;FONT size="3" color="#000000"&gt;&lt;SPAN&gt;お客様からの懸念の声に備え、以下の事実をベースにご対応をお願いいたします。&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;UL style="direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;" type="disc"&gt;
&lt;LI style="margin-top: 0; margin-bottom: 0; vertical-align: middle; color: blue;"&gt;&lt;FONT size="3" color="#000000"&gt;&lt;STRONG&gt;悪用の事例なし:&lt;/STRONG&gt;&lt;SPAN&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;現時点で、これらの脆弱性が悪意を持ってエクスプロイト（悪用）された事実は確認されておりません&amp;nbsp;。&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/LI&gt;
&lt;LI style="margin-top: 0; margin-bottom: 0; vertical-align: middle; color: blue;"&gt;&lt;FONT size="3" color="#000000"&gt;&lt;STRONG&gt;クラウドインフラは保護済み:&lt;/STRONG&gt;&lt;SPAN&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;Cortexプラットフォームやクラウド配信型のネットワークセキュリティ製品などにつきましては、すでに保護機能が有効化されており、お客様側での対応は不要です&amp;nbsp;。&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/LI&gt;
&lt;LI style="margin-top: 0; margin-bottom: 0; vertical-align: middle; color: blue;"&gt;&lt;FONT size="3" color="#000000"&gt;&lt;STRONG&gt;オンプレミス向けパッチの提供:&lt;/STRONG&gt;&lt;SPAN&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;PAN-OSやGlobalProtectなど、広く導入されているオンプレミスソフトウェアのすべてのリリースに対して、修正版バージョンがアドバイザリ公開と同時に利用可能となります&amp;nbsp;。&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P style="margin: 0in; margin-left: .375in; font-family: 游ゴシック; font-size: 11.0pt; color: blue;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: 'Google Sans Text'; font-size: 11.0pt; color: blue;"&gt;&lt;STRONG&gt;&lt;FONT size="3" color="#000000"&gt;■ ASCパートナー様向けのサポートツールと体制&amp;nbsp;&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: 'Google Sans Text'; font-size: 11.0pt; color: blue;"&gt;&lt;FONT size="3" color="#000000"&gt;&lt;SPAN&gt;アドバイザリ公開後、エンドユーザー様からの急な問い合わせ対応など、皆様には多大なるご負担をおかけすることと存じます。相互のお客様の自己解決能力を高め、皆様の業務負荷を軽減するため、以下のツールを強化・提供いたします 。&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;UL style="direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;" type="disc"&gt;
&lt;LI style="margin-top: 0; margin-bottom: 0; vertical-align: middle; color: blue;"&gt;&lt;FONT size="3" color="#000000"&gt;&lt;STRONG&gt;CSP (カスタマーサポートポータル) の強化:&lt;/STRONG&gt;&lt;SPAN&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;アドバイザリデータや外部の脅威情報を学習した「CSP-Copilot」が自動応答でサポートを支援します 。また、「CSP Asset View」により、お客様ご自身で高深刻度CVEに対するエクスポージャー状況を追跡可能となります（24時間ごとに更新） 。&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/LI&gt;
&lt;LI style="margin-top: 0; margin-bottom: 0; vertical-align: middle; color: blue;"&gt;&lt;FONT size="3" color="#000000"&gt;&lt;STRONG&gt;Questスキャンツール:&lt;/STRONG&gt;&lt;SPAN&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;テクニカルサポートファイル（TSF）スキャンにより、お客様の環境のリスクや潜在的なエクスプロイトを特定するためのCVEシグネチャが実装されております 。&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P style="margin: 0in; margin-left: .375in; font-family: 游ゴシック; font-size: 11.0pt; color: blue;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: 'Google Sans Text'; font-size: 11.0pt; color: blue;"&gt;&lt;FONT size="3" color="#000000"&gt;&lt;SPAN&gt;今回のAIを活用したプロアクティブ対応は一時的なものではなく、今後の「AI主導の防衛 (AI-Speed Defense)」に向けた日常的プロセスへの移行を見据えたものです 。&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: 'Google Sans Text'; font-size: 11.0pt; color: blue;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: 'Google Sans Text'; font-size: 11.0pt; color: blue;"&gt;&lt;FONT size="3" color="#000000"&gt;&lt;SPAN&gt;本件に関してご不明な点や、お客様対応で困難な状況が発生した場合は、担当のパートナーサービスマネージャー（PSM）またはサポート窓口まで遠慮なくご相談ください。引き続き、皆様との強固なパートナーシップにより、日本のお客様の安全維持に努める所存です。&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;/DIV&gt;</description>
    <pubDate>Thu, 14 May 2026 00:27:12 GMT</pubDate>
    <dc:creator>ymukae</dc:creator>
    <dc:date>2026-05-14T00:27:12Z</dc:date>
    <item>
      <title>Frontier AIモデル活用による脆弱性対応プロセス</title>
      <link>https://live.paloaltonetworks.com/t5/asc%E3%83%97%E3%83%AD%E3%82%B0%E3%83%A9%E3%83%A0%E3%83%89%E3%82%AD%E3%83%A5%E3%83%A1%E3%83%B3%E3%83%88/frontier-ai%E3%83%A2%E3%83%87%E3%83%AB%E6%B4%BB%E7%94%A8%E3%81%AB%E3%82%88%E3%82%8B%E8%84%86%E5%BC%B1%E6%80%A7%E5%AF%BE%E5%BF%9C%E3%83%97%E3%83%AD%E3%82%BB%E3%82%B9/ta-p/1253887</link>
      <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;P style="margin: 0in;"&gt;&lt;FONT size="3" color="#000000"&gt;&lt;SPAN&gt;【2026年5月14日付け公開通知サマリー】&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P style="margin: 0in;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV&gt;
&lt;DIV class="gmail_signature" dir="ltr"&gt;
&lt;DIV dir="ltr"&gt;
&lt;DIV dir="ltr"&gt;
&lt;DIV class="gmail_quote"&gt;本日米国時間5月13日&lt;A href="https://security.paloaltonetworks.com/" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://security.paloaltonetworks.com/&amp;amp;source=gmail&amp;amp;ust=1778800065776000&amp;amp;usg=AOvVaw1pviKCLlFoeMjUt4jSKZ3g"&gt;Se&lt;WBR /&gt;curity Advisories&lt;/A&gt;&amp;nbsp;が公開されましたのでご確認ください。&lt;/DIV&gt;
&lt;DIV class="gmail_quote"&gt;&lt;A href="https://security.paloaltonetworks.com/" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://security.paloaltonetworks.com/&amp;amp;source=gmail&amp;amp;ust=1778800065776000&amp;amp;usg=AOvVaw1pviKCLlFoeMjUt4jSKZ3g"&gt;https://security.&lt;WBR /&gt;paloaltonetworks.com/&lt;/A&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="gmail_quote"&gt;(計24件。内訳：HIGH: PAN-OS 3件。MEDIUM: PAN-OS 5件、WF-500/WF-500B 1件、GlobalProtect App 3件、Prisma Access Agent 4件、Prisma SD-WAN 2件、(CyberArk) Trust Protection Foundation 3件、Chronosphere Chronocollector 1件、Prisma Browser 1件。LOW: Broker VM 1件。)&lt;/DIV&gt;
&lt;DIV class="gmail_quote"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="gmail_quote"&gt;PSMからの前メールで案内ありましたように、Frontier AIモデルの活用により弊社製品に潜在する脆弱性の分析・&lt;WBR /&gt;検出を飛躍的に進められるようになりました。プロアクティブに脆弱性対応を行っていく弊社方針により、&lt;WBR /&gt;今後も月次Patch WednesdayのSecurity Advisories公開件数は今回と同等レベルのものが見込ま&lt;WBR /&gt;れます。&lt;/DIV&gt;
&lt;DIV class="gmail_quote"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="gmail_quote"&gt;&lt;STRONG&gt;"Patch Wednesday"について：&lt;/STRONG&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="gmail_quote"&gt;Security&amp;nbsp;&lt;WBR /&gt;Advisoriesは毎月第2水曜日(米国時間)&lt;WBR /&gt;にリリースされます。&lt;WBR /&gt;スケジュールとポリシーに関してはこちらをご覧ください。&amp;nbsp;&lt;BR /&gt;&lt;A href="https://www.paloaltonetworks.com/product-security-assurance" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://www.paloaltonetworks.com/product-security-assurance&amp;amp;source=gmail&amp;amp;ust=1778800065776000&amp;amp;usg=AOvVaw2d1W5KQdfm1is-D2WFKXJh"&gt;https://www.paloaltonetworks.&lt;WBR /&gt;com/product-security-assurance&lt;/A&gt;　&lt;BR /&gt;※緊急性の高い脆弱性(”vulnearabilities with a proof of active exploitation or have potential for active exploitation")に関しては定期スケジュール対象外　&lt;/DIV&gt;
&lt;DIV class="gmail_quote"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ymukae_0-1778717724754.png" style="width: 673px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/71415iBFD701BF410D83D7/image-dimensions/673x322?v=v2" width="673" height="322" role="button" title="ymukae_0-1778717724754.png" alt="ymukae_0-1778717724754.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;STRONG&gt;Security&amp;nbsp;&lt;WBR style="font-family: inherit;" /&gt;Advisories自動送信メールを受け取るためには：&lt;/STRONG&gt;&lt;SPAN&gt;Customer Support Portal (CSP:&amp;nbsp;&lt;/SPAN&gt;&lt;A style="font-family: inherit; background-color: #ffffff;" href="https://support.paloaltonetworks.com/" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://support.paloaltonetworks.com/&amp;amp;source=gmail&amp;amp;ust=1778800065776000&amp;amp;usg=AOvVaw27XsCicr8PBtoU-USW-9zN"&gt;https://support.&lt;WBR /&gt;paloaltonetworks.com&lt;/A&gt;&lt;SPAN&gt;)にログイン後、&lt;/SPAN&gt;&lt;WBR style="font-family: inherit;" /&gt;&lt;SPAN&gt;右上ユーザー名のプルダウンメニューから”&lt;/SPAN&gt;&lt;WBR style="font-family: inherit;" /&gt;&lt;SPAN&gt;Preferences"をお選び頂き、”My Support Notifications"ページの”Subscribe to Product&amp;nbsp;Security&amp;nbsp;Advisories"&lt;/SPAN&gt;&lt;WBR style="font-family: inherit;" /&gt;&lt;SPAN&gt;を選択頂くようお願いします。&lt;/SPAN&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV&gt;
&lt;DIV class="gmail_signature" dir="ltr"&gt;
&lt;DIV dir="ltr"&gt;
&lt;DIV dir="ltr"&gt;
&lt;DIV class="gmail_quote"&gt;
&lt;DIV class="gmail_quote"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ymukae_1-1778717818493.png" style="width: 674px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/71416i66CAB990F3243272/image-dimensions/674x303?v=v2" width="674" height="303" role="button" title="ymukae_1-1778717818493.png" alt="ymukae_1-1778717818493.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="gmail_attr" dir="ltr"&gt;On Wed, May 13, 2026 at 9:17 AM New Palo Alto Networks Security Advisories for May, 2026 &amp;lt;&lt;A href="mailto:updates@paloaltonetworks.com" target="_blank" rel="noopener"&gt;updates@paloaltonetworks.com&lt;/A&gt;&amp;gt; wrote:&lt;/DIV&gt;
&lt;BLOCKQUOTE class="gmail_quote"&gt;
&lt;DIV&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ymukae_2-1778717890388.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/71418iADCDE12E5F741655/image-size/medium?v=v2&amp;amp;px=400" role="button" title="ymukae_2-1778717890388.png" alt="ymukae_2-1778717890388.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;H2&gt;New Palo Alto Networks Security Advisories&lt;/H2&gt;
&lt;DIV&gt;Palo Alto Networks published 24 new security advisories at&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://urldefense.proofpoint.com/v2/url?u=https-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7TwW9dLirq-2D2BIqtdrkZxFgQdzxkI-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal7iviguiBHlx9U689OZT-2D2BeG40pDpk0pbdqdkhKRKnR-2D2BHC2GnyXmoNJer0iJL1lRUHJg6yZeGn98HTVyT0faDSis5Dky2j-2D2F2oHJhJ5DCy0B-2D2FZUM61i2IgBEjczf2a5AsR1A-2D3D-2D3D&amp;amp;d=DwMFAg&amp;amp;c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&amp;amp;r=bCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q&amp;amp;m=ZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4&amp;amp;s=YpBEGDsxVXQpB_eW-9dwuXyYbeD-fjnblClgImpEv3o&amp;amp;e=" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://urldefense.proofpoint.com/v2/url?u%3Dhttps-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7TwW9dLirq-2D2BIqtdrkZxFgQdzxkI-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal7iviguiBHlx9U689OZT-2D2BeG40pDpk0pbdqdkhKRKnR-2D2BHC2GnyXmoNJer0iJL1lRUHJg6yZeGn98HTVyT0faDSis5Dky2j-2D2F2oHJhJ5DCy0B-2D2FZUM61i2IgBEjczf2a5AsR1A-2D3D-2D3D%26d%3DDwMFAg%26c%3DV9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo%26r%3DbCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q%26m%3DZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4%26s%3DYpBEGDsxVXQpB_eW-9dwuXyYbeD-fjnblClgImpEv3o%26e%3D&amp;amp;source=gmail&amp;amp;ust=1778800065776000&amp;amp;usg=AOvVaw3-hJrvVfGFfzXo7oA081Wb"&gt;https://security.&lt;WBR /&gt;paloaltonetworks.com&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;on May 13, 2026:&lt;/DIV&gt;
&lt;BR /&gt;
&lt;DIV&gt;PAN-OS&lt;/DIV&gt;
&lt;HR /&gt;
&lt;DIV&gt;
&lt;DIV&gt;CVE-2026-0265 PAN-OS: Authentication Bypass with Cloud Authentication Service (CAS) enabled (Severity: LOW)&lt;/DIV&gt;
&lt;DIV&gt;&lt;A href="https://urldefense.proofpoint.com/v2/url?u=https-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbNCq99RO8GEC5qWL6JeHB8A-2D3D-2D3DJc-2D-2D-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBalzw28uj1KxPEJlxFGKlDN4v63wkSg4HY960-2D2FJhugt7LMelvdgqcF6hRqUtnUpe-2D2BJ0P-2D2BQlaoO1451HrncE0Z5FXoCUI66vC-2D2FFw80Nuuyl5d5LRqy-2D2FGBXz5q-2D2F-2D2F3BiXe-2D2BzjYA-2D3D-2D3D&amp;amp;d=DwMFAg&amp;amp;c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&amp;amp;r=bCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q&amp;amp;m=ZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4&amp;amp;s=R7B5EvTQObiQvg-3ICTizY4Ci9EoCHkbwWYUzIwQLMA&amp;amp;e=" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://urldefense.proofpoint.com/v2/url?u%3Dhttps-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbNCq99RO8GEC5qWL6JeHB8A-2D3D-2D3DJc-2D-2D-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBalzw28uj1KxPEJlxFGKlDN4v63wkSg4HY960-2D2FJhugt7LMelvdgqcF6hRqUtnUpe-2D2BJ0P-2D2BQlaoO1451HrncE0Z5FXoCUI66vC-2D2FFw80Nuuyl5d5LRqy-2D2FGBXz5q-2D2F-2D2F3BiXe-2D2BzjYA-2D3D-2D3D%26d%3DDwMFAg%26c%3DV9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo%26r%3DbCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q%26m%3DZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4%26s%3DR7B5EvTQObiQvg-3ICTizY4Ci9EoCHkbwWYUzIwQLMA%26e%3D&amp;amp;source=gmail&amp;amp;ust=1778800065776000&amp;amp;usg=AOvVaw2a_mG3HwxhMF9l5hOmdKgc"&gt;https://security.&lt;WBR /&gt;paloaltonetworks.com/CVE-2026-&lt;WBR /&gt;0265&lt;/A&gt;&lt;/DIV&gt;
&lt;BR /&gt;
&lt;DIV&gt;CVE-2026-0264 PAN-OS: Heap-Based Buffer Overflow in DNS Proxy and DNS Server Allows Unauthenticated Remote Code Execution (Severity: MEDIUM)&lt;/DIV&gt;
&lt;DIV&gt;&lt;A href="https://urldefense.proofpoint.com/v2/url?u=https-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbQ76buAw-2D2FP3UVyNyVbxULEQ-2D3D-2D3DrzVD-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal96o1o2ynOEaZoqCAAZn-2D2FPdcCNhdcsZOLUJEGIUIu-2D2BV7dcIoUfQChYQjgzk-2D2FjBx4oM86y7WBpQ6ersOVXk9gkEDcsIzoA5xOCksZXBuA-2D2FxPqcvlP4AuM7m-2D2BOPwfiYUDuVQ-2D3D-2D3D&amp;amp;d=DwMFAg&amp;amp;c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&amp;amp;r=bCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q&amp;amp;m=ZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4&amp;amp;s=dWR2RouKJ79qEQW1frA4B1ElGtRiEHfY_VDSEK1Crpg&amp;amp;e=" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://urldefense.proofpoint.com/v2/url?u%3Dhttps-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbQ76buAw-2D2FP3UVyNyVbxULEQ-2D3D-2D3DrzVD-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal96o1o2ynOEaZoqCAAZn-2D2FPdcCNhdcsZOLUJEGIUIu-2D2BV7dcIoUfQChYQjgzk-2D2FjBx4oM86y7WBpQ6ersOVXk9gkEDcsIzoA5xOCksZXBuA-2D2FxPqcvlP4AuM7m-2D2BOPwfiYUDuVQ-2D3D-2D3D%26d%3DDwMFAg%26c%3DV9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo%26r%3DbCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q%26m%3DZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4%26s%3DdWR2RouKJ79qEQW1frA4B1ElGtRiEHfY_VDSEK1Crpg%26e%3D&amp;amp;source=gmail&amp;amp;ust=1778800065776000&amp;amp;usg=AOvVaw0kXD9ZXhtQMilnPkEvXZlt"&gt;https://security.&lt;WBR /&gt;paloaltonetworks.com/CVE-2026-&lt;WBR /&gt;0264&lt;/A&gt;&lt;/DIV&gt;
&lt;BR /&gt;
&lt;DIV&gt;CVE-2026-0263 PAN-OS: Remote Code Execution (RCE) in IKEv2 Processing (Severity: HIGH)&lt;/DIV&gt;
&lt;DIV&gt;&lt;A href="https://urldefense.proofpoint.com/v2/url?u=https-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbo5RWF7jrgbs0lMI63jSUMA-2D3D-2D3DXsM3-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal61zCnNrvUq2xfAt9rV03digPDzGLxNmnG3fCaboUDnWoyrIjS3UF3UU0s30vtM2srzijjOFmlyL3fOos67eKZMc0cOhkMvQH6cp1IrYfAkrgl92k-2D2BoKQQPtw4do1F-2D2FlDw-2D3D-2D3D&amp;amp;d=DwMFAg&amp;amp;c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&amp;amp;r=bCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q&amp;amp;m=ZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4&amp;amp;s=P4zVdYQ6CEyZjhXutH8Yd9SQqTsiJqY0jF2cSgEffcc&amp;amp;e=" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://urldefense.proofpoint.com/v2/url?u%3Dhttps-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbo5RWF7jrgbs0lMI63jSUMA-2D3D-2D3DXsM3-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal61zCnNrvUq2xfAt9rV03digPDzGLxNmnG3fCaboUDnWoyrIjS3UF3UU0s30vtM2srzijjOFmlyL3fOos67eKZMc0cOhkMvQH6cp1IrYfAkrgl92k-2D2BoKQQPtw4do1F-2D2FlDw-2D3D-2D3D%26d%3DDwMFAg%26c%3DV9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo%26r%3DbCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q%26m%3DZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4%26s%3DP4zVdYQ6CEyZjhXutH8Yd9SQqTsiJqY0jF2cSgEffcc%26e%3D&amp;amp;source=gmail&amp;amp;ust=1778800065776000&amp;amp;usg=AOvVaw1vhl3fKsy2wSr9XUuwPLt2"&gt;https://security.&lt;WBR /&gt;paloaltonetworks.com/CVE-2026-&lt;WBR /&gt;0263&lt;/A&gt;&lt;/DIV&gt;
&lt;BR /&gt;
&lt;DIV&gt;CVE-2026-0262 PAN-OS: Denial of Service Vulnerabilities in Network Traffic Parsing (Severity: MEDIUM)&lt;/DIV&gt;
&lt;DIV&gt;&lt;A href="https://urldefense.proofpoint.com/v2/url?u=https-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbl82KmI2KD5etnus2seaXng-2D3D-2D3D-2Dv1S-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal-2D2Fc2XxcyMYLUnwRpdPfcU28hOprHuWHxkpb8JOKaIO75qf6r5lpwjXKfGRKHtKVvFYH6OTi0TzG7SrJiViBlocrN01DRL8GUFvDIUPnborXbdPcP5h1xGlmZxBpxkYi4dQ-2D3D-2D3D&amp;amp;d=DwMFAg&amp;amp;c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&amp;amp;r=bCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q&amp;amp;m=ZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4&amp;amp;s=8MIJ2v-lv59OkoH40WX5SiFynqokqeM1Tl8PwWjRGDs&amp;amp;e=" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://urldefense.proofpoint.com/v2/url?u%3Dhttps-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbl82KmI2KD5etnus2seaXng-2D3D-2D3D-2Dv1S-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal-2D2Fc2XxcyMYLUnwRpdPfcU28hOprHuWHxkpb8JOKaIO75qf6r5lpwjXKfGRKHtKVvFYH6OTi0TzG7SrJiViBlocrN01DRL8GUFvDIUPnborXbdPcP5h1xGlmZxBpxkYi4dQ-2D3D-2D3D%26d%3DDwMFAg%26c%3DV9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo%26r%3DbCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q%26m%3DZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4%26s%3D8MIJ2v-lv59OkoH40WX5SiFynqokqeM1Tl8PwWjRGDs%26e%3D&amp;amp;source=gmail&amp;amp;ust=1778800065776000&amp;amp;usg=AOvVaw0isN9Ay3uTYN0aL5So6zZu"&gt;https://security.&lt;WBR /&gt;paloaltonetworks.com/CVE-2026-&lt;WBR /&gt;0262&lt;/A&gt;&lt;/DIV&gt;
&lt;BR /&gt;
&lt;DIV&gt;CVE-2026-0261 PAN-OS: Authenticated Admin Command Injection Vulnerability (Severity: MEDIUM)&lt;/DIV&gt;
&lt;DIV&gt;&lt;A href="https://urldefense.proofpoint.com/v2/url?u=https-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbLBPqKe80kH9pjY-2D2ByWN6vYw-2D3D-2D3D5Qcq-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal-2D2BgSxC-2D2F7MYyElcxbXQK2oDx8qragiSvv7TnZ6IVGhN3BH0GVWenolkNcsj5qOdMB54wHGjBurHX7jJqBTJ-2D2FcUAHgxzDY6FbZ8GA7GKShOLc08P-2D2BXM3XfvxC92ZvyDCghCg-2D3D-2D3D&amp;amp;d=DwMFAg&amp;amp;c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&amp;amp;r=bCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q&amp;amp;m=ZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4&amp;amp;s=Qg9R8qTVSkd-ifjGfQplijRdnycqtA3xOcTC4uxvick&amp;amp;e=" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://urldefense.proofpoint.com/v2/url?u%3Dhttps-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbLBPqKe80kH9pjY-2D2ByWN6vYw-2D3D-2D3D5Qcq-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal-2D2BgSxC-2D2F7MYyElcxbXQK2oDx8qragiSvv7TnZ6IVGhN3BH0GVWenolkNcsj5qOdMB54wHGjBurHX7jJqBTJ-2D2FcUAHgxzDY6FbZ8GA7GKShOLc08P-2D2BXM3XfvxC92ZvyDCghCg-2D3D-2D3D%26d%3DDwMFAg%26c%3DV9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo%26r%3DbCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q%26m%3DZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4%26s%3DQg9R8qTVSkd-ifjGfQplijRdnycqtA3xOcTC4uxvick%26e%3D&amp;amp;source=gmail&amp;amp;ust=1778800065776000&amp;amp;usg=AOvVaw0c5_0aKjXnJVfx6phuzxBy"&gt;https://security.&lt;WBR /&gt;paloaltonetworks.com/CVE-2026-&lt;WBR /&gt;0261&lt;/A&gt;&lt;/DIV&gt;
&lt;BR /&gt;
&lt;DIV&gt;CVE-2026-0258 PAN-OS: Server-Side Request Forgery (SSRF) in IKEv2 Certificate URL Fetching (Severity: MEDIUM)&lt;/DIV&gt;
&lt;DIV&gt;&lt;A href="https://urldefense.proofpoint.com/v2/url?u=https-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbtWcxjf98pxmHejkba-2D2Bv2nA-2D3D-2D3DoWOI-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal-2D2BEqn1nRlu5wLZtM6jCRSn2eOVMTn5OPk7w3SSRIqkv4xXUXZ-2D2FkoKG2bp2ElsLj1fCrfgDBIPerf5yt1SeeROC7QVctFlieEm1AdMFBABsBeP3rWY-2D2Bt5DiC4Me9PVw2whw-2D3D-2D3D&amp;amp;d=DwMFAg&amp;amp;c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&amp;amp;r=bCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q&amp;amp;m=ZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4&amp;amp;s=J6eiZ9EtHSE26F6pZW44seVr1-b9ubtfv26HdvBHqSI&amp;amp;e=" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://urldefense.proofpoint.com/v2/url?u%3Dhttps-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbtWcxjf98pxmHejkba-2D2Bv2nA-2D3D-2D3DoWOI-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal-2D2BEqn1nRlu5wLZtM6jCRSn2eOVMTn5OPk7w3SSRIqkv4xXUXZ-2D2FkoKG2bp2ElsLj1fCrfgDBIPerf5yt1SeeROC7QVctFlieEm1AdMFBABsBeP3rWY-2D2Bt5DiC4Me9PVw2whw-2D3D-2D3D%26d%3DDwMFAg%26c%3DV9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo%26r%3DbCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q%26m%3DZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4%26s%3DJ6eiZ9EtHSE26F6pZW44seVr1-b9ubtfv26HdvBHqSI%26e%3D&amp;amp;source=gmail&amp;amp;ust=1778800065776000&amp;amp;usg=AOvVaw091LJ_2vGtMgNLUsLEuC2B"&gt;https://security.&lt;WBR /&gt;paloaltonetworks.com/CVE-2026-&lt;WBR /&gt;0258&lt;/A&gt;&lt;/DIV&gt;
&lt;BR /&gt;
&lt;DIV&gt;CVE-2026-0257 PAN-OS: GlobalProtect Authentication Bypass Vulnerabilities (Severity: MEDIUM)&lt;/DIV&gt;
&lt;DIV&gt;&lt;A href="https://urldefense.proofpoint.com/v2/url?u=https-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbVjUFkP-2D2F8qPR-2D2FgvLZR3kpAw-2D3D-2D3DeP5a-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal7QyIzrkSHZBCHhfoJwQIaTcE94ctNrdMpzu9tpfVlaKRQvE2ZJifnSWkaZwHhKqLNG228m12X2og1VQ4Xi-2D2F7BrTHzpSLzEfGOsaDQWK3t6onhQYclKQ2GlPppl9sJ7rbQ-2D3D-2D3D&amp;amp;d=DwMFAg&amp;amp;c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&amp;amp;r=bCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q&amp;amp;m=ZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4&amp;amp;s=EOu3X0v_RYjxaQ5RNfaWGqLNph958Fn5HqLihrz9pvg&amp;amp;e=" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://urldefense.proofpoint.com/v2/url?u%3Dhttps-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbVjUFkP-2D2F8qPR-2D2FgvLZR3kpAw-2D3D-2D3DeP5a-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal7QyIzrkSHZBCHhfoJwQIaTcE94ctNrdMpzu9tpfVlaKRQvE2ZJifnSWkaZwHhKqLNG228m12X2og1VQ4Xi-2D2F7BrTHzpSLzEfGOsaDQWK3t6onhQYclKQ2GlPppl9sJ7rbQ-2D3D-2D3D%26d%3DDwMFAg%26c%3DV9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo%26r%3DbCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q%26m%3DZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4%26s%3DEOu3X0v_RYjxaQ5RNfaWGqLNph958Fn5HqLihrz9pvg%26e%3D&amp;amp;source=gmail&amp;amp;ust=1778800065776000&amp;amp;usg=AOvVaw1JtZmUhoibITvBSVnVwTwd"&gt;https://security.&lt;WBR /&gt;paloaltonetworks.com/CVE-2026-&lt;WBR /&gt;0257&lt;/A&gt;&lt;/DIV&gt;
&lt;BR /&gt;
&lt;DIV&gt;CVE-2026-0256 PAN-OS: Stored Cross-Site Scripting (XSS) Vulnerability in the Web Interface (Severity: MEDIUM)&lt;/DIV&gt;
&lt;DIV&gt;&lt;A href="https://urldefense.proofpoint.com/v2/url?u=https-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbNWrYR0cQImLnp3d7hTN-2D2F4A-2D3D-2D3DHZqi-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal7yhjEVbQfQDAi-2D2FkuZDiOb0CmWnB1RSuuJuM-2D2FMmNOJ0MKx-2D2Bn0eEGztGKlE6G2l4QZ8Rx-2D2B2xMkOKNlW3MJ8ggQyudFBuMs3iO70dR6UKhw-2D2FtLyu-2D2FGtuDzhdWTJVHsE4ji9g-2D3D-2D3D&amp;amp;d=DwMFAg&amp;amp;c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&amp;amp;r=bCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q&amp;amp;m=ZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4&amp;amp;s=iIMscqV1evcjn2i-GktzPSpRJd4bmrayHB141v0G2gI&amp;amp;e=" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://urldefense.proofpoint.com/v2/url?u%3Dhttps-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbNWrYR0cQImLnp3d7hTN-2D2F4A-2D3D-2D3DHZqi-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal7yhjEVbQfQDAi-2D2FkuZDiOb0CmWnB1RSuuJuM-2D2FMmNOJ0MKx-2D2Bn0eEGztGKlE6G2l4QZ8Rx-2D2B2xMkOKNlW3MJ8ggQyudFBuMs3iO70dR6UKhw-2D2FtLyu-2D2FGtuDzhdWTJVHsE4ji9g-2D3D-2D3D%26d%3DDwMFAg%26c%3DV9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo%26r%3DbCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q%26m%3DZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4%26s%3DiIMscqV1evcjn2i-GktzPSpRJd4bmrayHB141v0G2gI%26e%3D&amp;amp;source=gmail&amp;amp;ust=1778800065776000&amp;amp;usg=AOvVaw3zZ2U0K9SEo2_bSzMDBard"&gt;https://security.&lt;WBR /&gt;paloaltonetworks.com/CVE-2026-&lt;WBR /&gt;0256&lt;/A&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;BR /&gt;
&lt;DIV&gt;WildFire WF-500 and WF-500-B&lt;/DIV&gt;
&lt;HR /&gt;
&lt;DIV&gt;
&lt;DIV&gt;CVE-2026-0259 WildFire WF-500 and WF-500-B: Arbitrary File Read and Delete Vulnerability in WildFire Appliance (WF-500, WF-500-B) (Severity: MEDIUM)&lt;/DIV&gt;
&lt;DIV&gt;&lt;A href="https://urldefense.proofpoint.com/v2/url?u=https-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbfxys1cFQVp-2D2FPCn0-2D2FDxEZWQ-2D3D-2D3DxT8Q-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal0wBtYaiebwMZVO4mg7z52qndhg8bmM3ES8Y-2D2F5s5nZJSNAP0tFM1sjS-2D2B-2D2BmEm6ZZ-2D2BtNB9T9TiEVBFe2P6Q5IZL59i1h91sIaazvyimV-2D2FgUXFe4Rvjy9honC45UneF6-2D2FZ8xg-2D3D-2D3D&amp;amp;d=DwMFAg&amp;amp;c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&amp;amp;r=bCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q&amp;amp;m=ZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4&amp;amp;s=5rfd1h5VkPuP7Offdwml6NQv8jvTzyi4j77Rv0ELbis&amp;amp;e=" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://urldefense.proofpoint.com/v2/url?u%3Dhttps-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbfxys1cFQVp-2D2FPCn0-2D2FDxEZWQ-2D3D-2D3DxT8Q-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal0wBtYaiebwMZVO4mg7z52qndhg8bmM3ES8Y-2D2F5s5nZJSNAP0tFM1sjS-2D2B-2D2BmEm6ZZ-2D2BtNB9T9TiEVBFe2P6Q5IZL59i1h91sIaazvyimV-2D2FgUXFe4Rvjy9honC45UneF6-2D2FZ8xg-2D3D-2D3D%26d%3DDwMFAg%26c%3DV9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo%26r%3DbCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q%26m%3DZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4%26s%3D5rfd1h5VkPuP7Offdwml6NQv8jvTzyi4j77Rv0ELbis%26e%3D&amp;amp;source=gmail&amp;amp;ust=1778800065776000&amp;amp;usg=AOvVaw2J0_AKOpgpgoN9b_x8AdHu"&gt;https://security.&lt;WBR /&gt;paloaltonetworks.com/CVE-2026-&lt;WBR /&gt;0259&lt;/A&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;BR /&gt;
&lt;DIV&gt;GlobalProtect App&lt;/DIV&gt;
&lt;HR /&gt;
&lt;DIV&gt;
&lt;DIV&gt;CVE-2026-0251 GlobalProtect App: Local Privilege Escalation Vulnerabilities (Severity: MEDIUM)&lt;/DIV&gt;
&lt;DIV&gt;&lt;A href="https://urldefense.proofpoint.com/v2/url?u=https-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbAqbkxUN8rzlLby-2D2FEm3YKig-2D3D-2D3D67eB-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal-2D2BWrJ6IkasZmpeETWAQb41GU-2D2BT87xJzeUBMetByoN9P2O3pZIfP8MZop5nqYDpsy7spXDjxOZ951cVrOiszWBcvSB6UQLIOq0LnZSmelZ5m1DVIDXQZpFZPm6pB-2D2F2IgJ5vEWS-2D2B87z09X16IRQxiTTiM-2D3D&amp;amp;d=DwMFAg&amp;amp;c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&amp;amp;r=bCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q&amp;amp;m=ZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4&amp;amp;s=CN-enqh2GXXOmBkEUw56sjeYTyDJ74faWv1kamXB0eI&amp;amp;e=" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://urldefense.proofpoint.com/v2/url?u%3Dhttps-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbAqbkxUN8rzlLby-2D2FEm3YKig-2D3D-2D3D67eB-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal-2D2BWrJ6IkasZmpeETWAQb41GU-2D2BT87xJzeUBMetByoN9P2O3pZIfP8MZop5nqYDpsy7spXDjxOZ951cVrOiszWBcvSB6UQLIOq0LnZSmelZ5m1DVIDXQZpFZPm6pB-2D2F2IgJ5vEWS-2D2B87z09X16IRQxiTTiM-2D3D%26d%3DDwMFAg%26c%3DV9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo%26r%3DbCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q%26m%3DZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4%26s%3DCN-enqh2GXXOmBkEUw56sjeYTyDJ74faWv1kamXB0eI%26e%3D&amp;amp;source=gmail&amp;amp;ust=1778800065776000&amp;amp;usg=AOvVaw15Il5flM8CLMy_qKahkOOc"&gt;https://security.&lt;WBR /&gt;paloaltonetworks.com/CVE-2026-&lt;WBR /&gt;0251&lt;/A&gt;&lt;/DIV&gt;
&lt;BR /&gt;
&lt;DIV&gt;CVE-2026-0250 GlobalProtect App: Buffer Overflow Vulnerability during connection to Portal or Gateway (Severity: MEDIUM)&lt;/DIV&gt;
&lt;DIV&gt;&lt;A href="https://urldefense.proofpoint.com/v2/url?u=https-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbfqWg9tUeIDZ-2D2Fw5s2xgWeNQ-2D3D-2D3DZG0j-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBalwDtplEX5xrcaA-2D2BF5Fds1OwGqE16SxrI-2D2BjoFJUAhmosfXAon0YX8j3tMERtIlAZK3BKZP-2D2F9zhgVbYkML8bGNvSoXZp-2D2FYAznRrnUl277FfgWKsoxOZcsNMaxYdOdwW4aD2aZ7kHW5zoGz8B40ToriKwg-2D3D&amp;amp;d=DwMFAg&amp;amp;c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&amp;amp;r=bCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q&amp;amp;m=ZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4&amp;amp;s=1S9eUgHl-AiCdRjPszZ9JjxUuikhrwA0bbFC3ywC1qQ&amp;amp;e=" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://urldefense.proofpoint.com/v2/url?u%3Dhttps-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbfqWg9tUeIDZ-2D2Fw5s2xgWeNQ-2D3D-2D3DZG0j-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBalwDtplEX5xrcaA-2D2BF5Fds1OwGqE16SxrI-2D2BjoFJUAhmosfXAon0YX8j3tMERtIlAZK3BKZP-2D2F9zhgVbYkML8bGNvSoXZp-2D2FYAznRrnUl277FfgWKsoxOZcsNMaxYdOdwW4aD2aZ7kHW5zoGz8B40ToriKwg-2D3D%26d%3DDwMFAg%26c%3DV9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo%26r%3DbCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q%26m%3DZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4%26s%3D1S9eUgHl-AiCdRjPszZ9JjxUuikhrwA0bbFC3ywC1qQ%26e%3D&amp;amp;source=gmail&amp;amp;ust=1778800065776000&amp;amp;usg=AOvVaw1vnd2SryAcuc-_GYQ-WZrq"&gt;https://security.&lt;WBR /&gt;paloaltonetworks.com/CVE-2026-&lt;WBR /&gt;0250&lt;/A&gt;&lt;/DIV&gt;
&lt;BR /&gt;
&lt;DIV&gt;CVE-2026-0249 GlobalProtect App: Certificate Validation Bypass Vulnerabilities (Severity: MEDIUM)&lt;/DIV&gt;
&lt;DIV&gt;&lt;A href="https://urldefense.proofpoint.com/v2/url?u=https-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbG1SJrSZookYcRda5yTR6rw-2D3D-2D3DAX65-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBalzFefL4ykCGQuVWWe-2D2BicNLZHqppuVFPHA89acZRdypwsq66Lqgc-2D2BLJhzhhrpuTMrtctmSeek7A2pop1j39a-2D2FMCV1CmDfA-2D2FzMkuvTxn-2D2BkjgUVZmCn9OTOm0ursg-2D2ByoyXDadfJgBnEHpSt-2D2BHktT-2D2F-2D2F5Ejg-2D3D&amp;amp;d=DwMFAg&amp;amp;c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&amp;amp;r=bCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q&amp;amp;m=ZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4&amp;amp;s=cr95rW7Y_lSkBvIh1wZkf1z2fE4gZf-YRL5QVmVH4fw&amp;amp;e=" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://urldefense.proofpoint.com/v2/url?u%3Dhttps-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbG1SJrSZookYcRda5yTR6rw-2D3D-2D3DAX65-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBalzFefL4ykCGQuVWWe-2D2BicNLZHqppuVFPHA89acZRdypwsq66Lqgc-2D2BLJhzhhrpuTMrtctmSeek7A2pop1j39a-2D2FMCV1CmDfA-2D2FzMkuvTxn-2D2BkjgUVZmCn9OTOm0ursg-2D2ByoyXDadfJgBnEHpSt-2D2BHktT-2D2F-2D2F5Ejg-2D3D%26d%3DDwMFAg%26c%3DV9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo%26r%3DbCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q%26m%3DZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4%26s%3Dcr95rW7Y_lSkBvIh1wZkf1z2fE4gZf-YRL5QVmVH4fw%26e%3D&amp;amp;source=gmail&amp;amp;ust=1778800065776000&amp;amp;usg=AOvVaw2ZWnCnY1NprqXmkUPAKH9Q"&gt;https://security.&lt;WBR /&gt;paloaltonetworks.com/CVE-2026-&lt;WBR /&gt;0249&lt;/A&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;BR /&gt;
&lt;DIV&gt;Prisma Access Agent&lt;/DIV&gt;
&lt;HR /&gt;
&lt;DIV&gt;
&lt;DIV&gt;CVE-2026-0248 Prisma Access Agent: Improper Certificate Validation Vulnerability (Severity: MEDIUM)&lt;/DIV&gt;
&lt;DIV&gt;&lt;A href="https://urldefense.proofpoint.com/v2/url?u=https-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbwOAhrnNkCsuqYD6O0nRsjw-2D3D-2D3DvIv6-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal6aczu41wTmlJwikp93oHUz2AC5T4xeowFhYIx2nvHOU5eLBRTU6pms6cFmmdiuw0wVvwsWBfjdfXXZ-2D2FEWHoJ6Lp1MSq9y1EmNO7yC6sFSw6XT3pX-2D2F3Xfew5DbzOvbAhMX-2D2FUBdWyP-2D2B84cu4j4icYOdw-2D3D&amp;amp;d=DwMFAg&amp;amp;c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&amp;amp;r=bCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q&amp;amp;m=ZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4&amp;amp;s=pFl3PGN-eDrk9-REalWYnd1lisGDQYnWv0L5N00Kypk&amp;amp;e=" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://urldefense.proofpoint.com/v2/url?u%3Dhttps-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbwOAhrnNkCsuqYD6O0nRsjw-2D3D-2D3DvIv6-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal6aczu41wTmlJwikp93oHUz2AC5T4xeowFhYIx2nvHOU5eLBRTU6pms6cFmmdiuw0wVvwsWBfjdfXXZ-2D2FEWHoJ6Lp1MSq9y1EmNO7yC6sFSw6XT3pX-2D2F3Xfew5DbzOvbAhMX-2D2FUBdWyP-2D2B84cu4j4icYOdw-2D3D%26d%3DDwMFAg%26c%3DV9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo%26r%3DbCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q%26m%3DZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4%26s%3DpFl3PGN-eDrk9-REalWYnd1lisGDQYnWv0L5N00Kypk%26e%3D&amp;amp;source=gmail&amp;amp;ust=1778800065776000&amp;amp;usg=AOvVaw2foFU0z5DGM5HE0A7vSA4K"&gt;https://security.&lt;WBR /&gt;paloaltonetworks.com/CVE-2026-&lt;WBR /&gt;0248&lt;/A&gt;&lt;/DIV&gt;
&lt;BR /&gt;
&lt;DIV&gt;CVE-2026-0247 Prisma Access Agent Endpoint DLP: Authorization Bypass Vulnerabilities (Severity: MEDIUM)&lt;/DIV&gt;
&lt;DIV&gt;&lt;A href="https://urldefense.proofpoint.com/v2/url?u=https-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbgKSpETlkUKiLRT8WaMF36A-2D3D-2D3D9Xrh-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal1m0rq9kGCImgSRO1-2D2BVIBrdgYBF1cRj6kBUDlHBAm1l1ZJ3Nq4bjf3I8RVjk9Pisxa7bpcPCWgeY3-2D2BTE3E3MTc-2D2B5kcTNA2B2BIFfI3LWgV8MfjcP9EjMSmE9r90SConq0-2D2FukV9nWn-2D2FheJj8JYPj0Grs-2D3D&amp;amp;d=DwMFAg&amp;amp;c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&amp;amp;r=bCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q&amp;amp;m=ZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4&amp;amp;s=qCb-nAveEm3uX3KV1j3LbyzMTXbfA5XkdwDxWMxKwlc&amp;amp;e=" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://urldefense.proofpoint.com/v2/url?u%3Dhttps-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbgKSpETlkUKiLRT8WaMF36A-2D3D-2D3D9Xrh-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal1m0rq9kGCImgSRO1-2D2BVIBrdgYBF1cRj6kBUDlHBAm1l1ZJ3Nq4bjf3I8RVjk9Pisxa7bpcPCWgeY3-2D2BTE3E3MTc-2D2B5kcTNA2B2BIFfI3LWgV8MfjcP9EjMSmE9r90SConq0-2D2FukV9nWn-2D2FheJj8JYPj0Grs-2D3D%26d%3DDwMFAg%26c%3DV9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo%26r%3DbCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q%26m%3DZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4%26s%3DqCb-nAveEm3uX3KV1j3LbyzMTXbfA5XkdwDxWMxKwlc%26e%3D&amp;amp;source=gmail&amp;amp;ust=1778800065776000&amp;amp;usg=AOvVaw0Um6_41nRs4RlxbSJxcnfa"&gt;https://security.&lt;WBR /&gt;paloaltonetworks.com/CVE-2026-&lt;WBR /&gt;0247&lt;/A&gt;&lt;/DIV&gt;
&lt;BR /&gt;
&lt;DIV&gt;CVE-2026-0246 Prisma Access Agent: Local Privilege Escalation Vulnerability (Severity: MEDIUM)&lt;/DIV&gt;
&lt;DIV&gt;&lt;A href="https://urldefense.proofpoint.com/v2/url?u=https-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlb-2D2Bdh0NpHb-2D2BNfOcDPa8pl2HA-2D3D-2D3DMwLi-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal93XKX-2D2BzliCViBLsTV3C5IzBmas1B1dYLDWn5BE7YYXRVOKWvw8olH6IDpTeikEPcG-2D2F0ghFoJ9syB3iPX0oyAGhh-2D2BgTz55ajwRfp1-2D2BbS7-2D2F9TvEali5DGYm0lJ96-2D2Fl8lUWY5K4OoPBqqJCDlxd9OLXNg-2D3D&amp;amp;d=DwMFAg&amp;amp;c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&amp;amp;r=bCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q&amp;amp;m=ZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4&amp;amp;s=SMBNnHfMbcCXVoPIx0UBKWV65IwWiFvHRcc5mAaN0Kk&amp;amp;e=" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://urldefense.proofpoint.com/v2/url?u%3Dhttps-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlb-2D2Bdh0NpHb-2D2BNfOcDPa8pl2HA-2D3D-2D3DMwLi-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal93XKX-2D2BzliCViBLsTV3C5IzBmas1B1dYLDWn5BE7YYXRVOKWvw8olH6IDpTeikEPcG-2D2F0ghFoJ9syB3iPX0oyAGhh-2D2BgTz55ajwRfp1-2D2BbS7-2D2F9TvEali5DGYm0lJ96-2D2Fl8lUWY5K4OoPBqqJCDlxd9OLXNg-2D3D%26d%3DDwMFAg%26c%3DV9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo%26r%3DbCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q%26m%3DZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4%26s%3DSMBNnHfMbcCXVoPIx0UBKWV65IwWiFvHRcc5mAaN0Kk%26e%3D&amp;amp;source=gmail&amp;amp;ust=1778800065776000&amp;amp;usg=AOvVaw30pDOJLerxdcdO2raykT9O"&gt;https://security.&lt;WBR /&gt;paloaltonetworks.com/CVE-2026-&lt;WBR /&gt;0246&lt;/A&gt;&lt;/DIV&gt;
&lt;BR /&gt;
&lt;DIV&gt;CVE-2026-0245 Prisma Access Agent: Information Disclosure Vulnerabilities (Severity: MEDIUM)&lt;/DIV&gt;
&lt;DIV&gt;&lt;A href="https://urldefense.proofpoint.com/v2/url?u=https-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbqxtfdXQ7Jbyrn4VIkXimeA-2D3D-2D3D-2DJLM-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal852WQzTJvlAABLkm196XFrDuEr90eQY0SzQjraMFHP1kynFdmPNgSnZs4ZQyHBULk6OHYkdduZJoLxzkfMtpyG-2D2BUq2Qt5nDI8HJ4Vg4S1GSDBYOOPEOQJWsLSF-2D2F3spRMz0-2D2FM7niz-2D2Fxn7o5mjB5vMCs-2D3D&amp;amp;d=DwMFAg&amp;amp;c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&amp;amp;r=bCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q&amp;amp;m=ZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4&amp;amp;s=YPIC1-Pt2BnUxjvMK6wg6o4iJwLza8HmIWS_OZotg34&amp;amp;e=" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://urldefense.proofpoint.com/v2/url?u%3Dhttps-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbqxtfdXQ7Jbyrn4VIkXimeA-2D3D-2D3D-2DJLM-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal852WQzTJvlAABLkm196XFrDuEr90eQY0SzQjraMFHP1kynFdmPNgSnZs4ZQyHBULk6OHYkdduZJoLxzkfMtpyG-2D2BUq2Qt5nDI8HJ4Vg4S1GSDBYOOPEOQJWsLSF-2D2F3spRMz0-2D2FM7niz-2D2Fxn7o5mjB5vMCs-2D3D%26d%3DDwMFAg%26c%3DV9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo%26r%3DbCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q%26m%3DZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4%26s%3DYPIC1-Pt2BnUxjvMK6wg6o4iJwLza8HmIWS_OZotg34%26e%3D&amp;amp;source=gmail&amp;amp;ust=1778800065776000&amp;amp;usg=AOvVaw05BUL8k8ZdEifZF_YzyFY2"&gt;https://security.&lt;WBR /&gt;paloaltonetworks.com/CVE-2026-&lt;WBR /&gt;0245&lt;/A&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;BR /&gt;
&lt;DIV&gt;Prisma SD-WAN ION&lt;/DIV&gt;
&lt;HR /&gt;
&lt;DIV&gt;
&lt;DIV&gt;CVE-2026-0244 Prisma SD-WAN: Improper Certificate Validation Vulnerability (Severity: MEDIUM)&lt;/DIV&gt;
&lt;DIV&gt;&lt;A href="https://urldefense.proofpoint.com/v2/url?u=https-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlb9LJNxBq3pKde-2D2FkOBUnpozg-2D3D-2D3D29VF-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal1xgZqjJMtiQrpEIjfypRr9VPgNZKqd9MrQZcqAVMTRAGfhtGaHteM11Jf9JmRuq74DweI8hMDmSbKCTZWyBtEg7kGkNqqHMWrt2oQgo55u2fQd2cvcHWAgYpdY38r4XnqICHf-2D2BQVGEdaDJbr-2D2FbdaUw-2D3D&amp;amp;d=DwMFAg&amp;amp;c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&amp;amp;r=bCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q&amp;amp;m=ZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4&amp;amp;s=Sjxy5s238ra8fA6zOzM3CP_Tpxl1MYEG19WEzLt40jY&amp;amp;e=" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://urldefense.proofpoint.com/v2/url?u%3Dhttps-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlb9LJNxBq3pKde-2D2FkOBUnpozg-2D3D-2D3D29VF-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal1xgZqjJMtiQrpEIjfypRr9VPgNZKqd9MrQZcqAVMTRAGfhtGaHteM11Jf9JmRuq74DweI8hMDmSbKCTZWyBtEg7kGkNqqHMWrt2oQgo55u2fQd2cvcHWAgYpdY38r4XnqICHf-2D2BQVGEdaDJbr-2D2FbdaUw-2D3D%26d%3DDwMFAg%26c%3DV9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo%26r%3DbCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q%26m%3DZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4%26s%3DSjxy5s238ra8fA6zOzM3CP_Tpxl1MYEG19WEzLt40jY%26e%3D&amp;amp;source=gmail&amp;amp;ust=1778800065776000&amp;amp;usg=AOvVaw2p6I1maKukrQnpkGQCf8Ud"&gt;https://security.&lt;WBR /&gt;paloaltonetworks.com/CVE-2026-&lt;WBR /&gt;0244&lt;/A&gt;&lt;/DIV&gt;
&lt;BR /&gt;
&lt;DIV&gt;CVE-2026-0243 Prisma SD-WAN: Denial of Service (DoS) Vulnerability Through IPv6 Crafted Packet (Severity: MEDIUM)&lt;/DIV&gt;
&lt;DIV&gt;&lt;A href="https://urldefense.proofpoint.com/v2/url?u=https-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbeYHEYavDqxTkUDmlDt2Q8g-2D3D-2D3DCIgm-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal-2D2BSckwQzNuhQjUguUuPsYi-2D2BV5E-2D2F0pdVE-2D2FO5UW6vZdGF7SF7qDiIuGSYAOwwNjvgEcqqdF2lu-2D2BzFiXFHOtrBx3coatYDDm4wsgevbX7PFHiGyNoKHVYlvulsbqZrdr7PPOmIZ214-2D2BJVPgR1RMEscqNz8-2D3D&amp;amp;d=DwMFAg&amp;amp;c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&amp;amp;r=bCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q&amp;amp;m=ZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4&amp;amp;s=7rURJ8yu4mQPSAEEL9UrJpKxFRPqBdBKu1QrylytPYo&amp;amp;e=" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://urldefense.proofpoint.com/v2/url?u%3Dhttps-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbeYHEYavDqxTkUDmlDt2Q8g-2D3D-2D3DCIgm-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal-2D2BSckwQzNuhQjUguUuPsYi-2D2BV5E-2D2F0pdVE-2D2FO5UW6vZdGF7SF7qDiIuGSYAOwwNjvgEcqqdF2lu-2D2BzFiXFHOtrBx3coatYDDm4wsgevbX7PFHiGyNoKHVYlvulsbqZrdr7PPOmIZ214-2D2BJVPgR1RMEscqNz8-2D3D%26d%3DDwMFAg%26c%3DV9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo%26r%3DbCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q%26m%3DZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4%26s%3D7rURJ8yu4mQPSAEEL9UrJpKxFRPqBdBKu1QrylytPYo%26e%3D&amp;amp;source=gmail&amp;amp;ust=1778800065776000&amp;amp;usg=AOvVaw1fpf37-B6nw6-_kvGNmPoK"&gt;https://security.&lt;WBR /&gt;paloaltonetworks.com/CVE-2026-&lt;WBR /&gt;0243&lt;/A&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;BR /&gt;
&lt;DIV&gt;Trust Protection Foundation&lt;/DIV&gt;
&lt;HR /&gt;
&lt;DIV&gt;
&lt;DIV&gt;CVE-2026-0242 Trust Protection Foundation: SQL Injection Vulnerability (Severity: MEDIUM)&lt;/DIV&gt;
&lt;DIV&gt;&lt;A href="https://urldefense.proofpoint.com/v2/url?u=https-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbVhMm-2D2BQJ2Ob-2D2BN-2D2FMeIr231sQ-2D3D-2D3D3rSm-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBalw5QlNbSaf7CQZq5dmCUZsaMrxtBJ2u9F5l7tejZVo6RLi6R6ednVB4TVZe86FdoeX-2D2BqyFpKHqoTuBf5a0FGRu0SrwI9nFjGyzx2ftYJUDh900hE0LFWEEPm8YzRiGqFdIEFN6f4IKE-2D2B7UUZgHeZN9U-2D3D&amp;amp;d=DwMFAg&amp;amp;c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&amp;amp;r=bCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q&amp;amp;m=ZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4&amp;amp;s=JllnQ_SG583dTm9cbc91PRWTpqrCImtKw1Y7MkcZkGs&amp;amp;e=" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://urldefense.proofpoint.com/v2/url?u%3Dhttps-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbVhMm-2D2BQJ2Ob-2D2BN-2D2FMeIr231sQ-2D3D-2D3D3rSm-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBalw5QlNbSaf7CQZq5dmCUZsaMrxtBJ2u9F5l7tejZVo6RLi6R6ednVB4TVZe86FdoeX-2D2BqyFpKHqoTuBf5a0FGRu0SrwI9nFjGyzx2ftYJUDh900hE0LFWEEPm8YzRiGqFdIEFN6f4IKE-2D2B7UUZgHeZN9U-2D3D%26d%3DDwMFAg%26c%3DV9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo%26r%3DbCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q%26m%3DZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4%26s%3DJllnQ_SG583dTm9cbc91PRWTpqrCImtKw1Y7MkcZkGs%26e%3D&amp;amp;source=gmail&amp;amp;ust=1778800065776000&amp;amp;usg=AOvVaw01aWK_4o7RmerxcrEz35kr"&gt;https://security.&lt;WBR /&gt;paloaltonetworks.com/CVE-2026-&lt;WBR /&gt;0242&lt;/A&gt;&lt;/DIV&gt;
&lt;BR /&gt;
&lt;DIV&gt;CVE-2026-0241 Trust Protection Foundation: Multiple Authorization Bypass Vulnerabilities (Severity: MEDIUM)&lt;/DIV&gt;
&lt;DIV&gt;&lt;A href="https://urldefense.proofpoint.com/v2/url?u=https-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlb-2D2BdKOAzmjIT2iIc1-2D2BiEXKhA-2D3D-2D3Dpk1O-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBaly5hdCDPGJKxlx6ivawpCN-2D2B0jgWZDR-2D2BdtVLkCPVSD0v-2D2FLuoDQAhO-2D2FeDZy7npyVpRdHsNSI8TyktsyMZ6z3lBCf1kj1DZF5BXg5u65D641PpzDl8Ngk0gGpRJGi9zzMpQmLDcLauueoMYV6Fc92-2D2FrWnM-2D3D&amp;amp;d=DwMFAg&amp;amp;c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&amp;amp;r=bCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q&amp;amp;m=ZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4&amp;amp;s=HKXyC2TL01qdteLKF1CdMCw8xzMHZKfa_DxA4zj9XhE&amp;amp;e=" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://urldefense.proofpoint.com/v2/url?u%3Dhttps-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlb-2D2BdKOAzmjIT2iIc1-2D2BiEXKhA-2D3D-2D3Dpk1O-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBaly5hdCDPGJKxlx6ivawpCN-2D2B0jgWZDR-2D2BdtVLkCPVSD0v-2D2FLuoDQAhO-2D2FeDZy7npyVpRdHsNSI8TyktsyMZ6z3lBCf1kj1DZF5BXg5u65D641PpzDl8Ngk0gGpRJGi9zzMpQmLDcLauueoMYV6Fc92-2D2FrWnM-2D3D%26d%3DDwMFAg%26c%3DV9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo%26r%3DbCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q%26m%3DZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4%26s%3DHKXyC2TL01qdteLKF1CdMCw8xzMHZKfa_DxA4zj9XhE%26e%3D&amp;amp;source=gmail&amp;amp;ust=1778800065776000&amp;amp;usg=AOvVaw0G0mDeh1mkALvrZP6324dm"&gt;https://security.&lt;WBR /&gt;paloaltonetworks.com/CVE-2026-&lt;WBR /&gt;0241&lt;/A&gt;&lt;/DIV&gt;
&lt;BR /&gt;
&lt;DIV&gt;CVE-2026-0240 Trust Protection Foundation: Sensitive Information Disclosure Vulnerability (Severity: MEDIUM)&lt;/DIV&gt;
&lt;DIV&gt;&lt;A href="https://urldefense.proofpoint.com/v2/url?u=https-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbPLkjQo9tS88DScAyqmxuig-2D3D-2D3Dm7EF-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal8nhYNe487fB4GYjet7RZ-2D2FQ07bd2Z9g3tuGiHiDDh8aSVq-2D2B3CSTAvnRQ6GBsQ4HMiTKLsNk1rMQUC3r-2D2BTZtCS4P3hk0AEanZJPcRFXLORLm99iqzGaYrqWxMaewUkzKeTmnd8eiFOm8xYtpAqqgtFKo-2D3D&amp;amp;d=DwMFAg&amp;amp;c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&amp;amp;r=bCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q&amp;amp;m=ZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4&amp;amp;s=fArdCGl9l8KtmeXMvSQN19v61r2aGN6VPDHeshPTBcY&amp;amp;e=" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://urldefense.proofpoint.com/v2/url?u%3Dhttps-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbPLkjQo9tS88DScAyqmxuig-2D3D-2D3Dm7EF-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal8nhYNe487fB4GYjet7RZ-2D2FQ07bd2Z9g3tuGiHiDDh8aSVq-2D2B3CSTAvnRQ6GBsQ4HMiTKLsNk1rMQUC3r-2D2BTZtCS4P3hk0AEanZJPcRFXLORLm99iqzGaYrqWxMaewUkzKeTmnd8eiFOm8xYtpAqqgtFKo-2D3D%26d%3DDwMFAg%26c%3DV9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo%26r%3DbCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q%26m%3DZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4%26s%3DfArdCGl9l8KtmeXMvSQN19v61r2aGN6VPDHeshPTBcY%26e%3D&amp;amp;source=gmail&amp;amp;ust=1778800065776000&amp;amp;usg=AOvVaw0BjocNp7aZKl15fa7oSAn5"&gt;https://security.&lt;WBR /&gt;paloaltonetworks.com/CVE-2026-&lt;WBR /&gt;0240&lt;/A&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;BR /&gt;
&lt;DIV&gt;Chronosphere Chronocollector&lt;/DIV&gt;
&lt;HR /&gt;
&lt;DIV&gt;
&lt;DIV&gt;CVE-2026-0239 Chronosphere Chronocollector Information Disclosure Vulnerability (Severity: MEDIUM)&lt;/DIV&gt;
&lt;DIV&gt;&lt;A href="https://urldefense.proofpoint.com/v2/url?u=https-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbWpRssn0fpqGAQb3BTCYzhA-2D3D-2D3Du3Ad-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal-2D2FGPo-2D2B4Ji7vDdIMvapMgYJP-2D2BLPQjiqdUr6qdsITf5zT18gBuId-2D2FhzzeQSaYANv3T3sxtjS5c4SoxyN-2D2FCf-2D2BGkIZWOIZLIozuTEWhHzNDAgdJqWmazg0qvNpFQUZEkWNE1wWwax5elcRf-2D2BTmvIkGIinIU-2D3D&amp;amp;d=DwMFAg&amp;amp;c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&amp;amp;r=bCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q&amp;amp;m=ZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4&amp;amp;s=5t7HntYa0PxE6Sk-w3B4cFsU6TvktJAqgtxfMUimYlY&amp;amp;e=" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://urldefense.proofpoint.com/v2/url?u%3Dhttps-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbWpRssn0fpqGAQb3BTCYzhA-2D3D-2D3Du3Ad-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal-2D2FGPo-2D2B4Ji7vDdIMvapMgYJP-2D2BLPQjiqdUr6qdsITf5zT18gBuId-2D2FhzzeQSaYANv3T3sxtjS5c4SoxyN-2D2FCf-2D2BGkIZWOIZLIozuTEWhHzNDAgdJqWmazg0qvNpFQUZEkWNE1wWwax5elcRf-2D2BTmvIkGIinIU-2D3D%26d%3DDwMFAg%26c%3DV9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo%26r%3DbCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q%26m%3DZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4%26s%3D5t7HntYa0PxE6Sk-w3B4cFsU6TvktJAqgtxfMUimYlY%26e%3D&amp;amp;source=gmail&amp;amp;ust=1778800065776000&amp;amp;usg=AOvVaw34qIVoW5avmmKWNxtwEpYa"&gt;https://security.&lt;WBR /&gt;paloaltonetworks.com/CVE-2026-&lt;WBR /&gt;0239&lt;/A&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;BR /&gt;
&lt;DIV&gt;Broker VM&lt;/DIV&gt;
&lt;HR /&gt;
&lt;DIV&gt;
&lt;DIV&gt;CVE-2026-0238 Broker VM: Improper Input Validation in Broker VM Certificate and Key Fields (Severity: LOW)&lt;/DIV&gt;
&lt;DIV&gt;&lt;A href="https://urldefense.proofpoint.com/v2/url?u=https-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbYKILQKOxXoaEURIFLmQv1w-2D3D-2D3DyyuQ-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBalwr1GASaWEdjMV6F5iIGO-2D2FHKW9bMWRi7pItrJVq9KOTDDxeLiM2GNKqhd42nqNk4gj-2D2F0a1A5WjB-2D2BXt8-2D2BvGcaGkFP2Uqk05uVn-2D2Bm5hP8bFkkwihsjOXqeYSMNVjNIpOYtW-2D2F7ItHfoXZ2cPq6oSKQDzW0-2D3D&amp;amp;d=DwMFAg&amp;amp;c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&amp;amp;r=bCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q&amp;amp;m=ZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4&amp;amp;s=UT84TDR-TBX1rC0DOXI-BfDRQggJVx5gZbIQc_lidDs&amp;amp;e=" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://urldefense.proofpoint.com/v2/url?u%3Dhttps-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7To9VyJiInwgSCjtwcYqOlbYKILQKOxXoaEURIFLmQv1w-2D3D-2D3DyyuQ-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBalwr1GASaWEdjMV6F5iIGO-2D2FHKW9bMWRi7pItrJVq9KOTDDxeLiM2GNKqhd42nqNk4gj-2D2F0a1A5WjB-2D2BXt8-2D2BvGcaGkFP2Uqk05uVn-2D2Bm5hP8bFkkwihsjOXqeYSMNVjNIpOYtW-2D2F7ItHfoXZ2cPq6oSKQDzW0-2D3D%26d%3DDwMFAg%26c%3DV9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo%26r%3DbCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q%26m%3DZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4%26s%3DUT84TDR-TBX1rC0DOXI-BfDRQggJVx5gZbIQc_lidDs%26e%3D&amp;amp;source=gmail&amp;amp;ust=1778800065776000&amp;amp;usg=AOvVaw3JFtuFN8dRTw0rXr8LnajI"&gt;https://security.&lt;WBR /&gt;paloaltonetworks.com/CVE-2026-&lt;WBR /&gt;0238&lt;/A&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;BR /&gt;
&lt;DIV&gt;Prisma Browser&lt;/DIV&gt;
&lt;HR /&gt;
&lt;DIV&gt;
&lt;DIV&gt;PAN-SA-2026-0007 Chromium and Prisma Browser: Monthly Vulnerability Update (May 2026) (Severity: MEDIUM)&lt;/DIV&gt;
&lt;DIV&gt;&lt;A href="https://urldefense.proofpoint.com/v2/url?u=https-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7TUinpGHGDwh5yfIb3rN1l-2D2FIaUNzeAF-2D2BrIPgIrXWtzYQg-2D3D-2D3DdRkQ-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal-2D2B-2D2F9b2U1U6ajCibiAX5ArkQrqQ15R2k4J5dypTY2jKoPkW-2D2B-2D2BczO2NUXG-2D2FbSvuravuUX5ux1qascQbXRUzg3pi9nNkPST5-2D2BLzL054ZSF6n30A362yiI-2D2FIHKgiC5adjO-2D2FNMpUxftrBW7q6nw0pSU3Jv2M-2D3D&amp;amp;d=DwMFAg&amp;amp;c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&amp;amp;r=bCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q&amp;amp;m=ZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4&amp;amp;s=zwSsCeUlrVgB8gC0SPdHrdjubvllTdS1dYu16P3-fl8&amp;amp;e=" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://urldefense.proofpoint.com/v2/url?u%3Dhttps-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7TUinpGHGDwh5yfIb3rN1l-2D2FIaUNzeAF-2D2BrIPgIrXWtzYQg-2D3D-2D3DdRkQ-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal-2D2B-2D2F9b2U1U6ajCibiAX5ArkQrqQ15R2k4J5dypTY2jKoPkW-2D2B-2D2BczO2NUXG-2D2FbSvuravuUX5ux1qascQbXRUzg3pi9nNkPST5-2D2BLzL054ZSF6n30A362yiI-2D2FIHKgiC5adjO-2D2FNMpUxftrBW7q6nw0pSU3Jv2M-2D3D%26d%3DDwMFAg%26c%3DV9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo%26r%3DbCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q%26m%3DZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4%26s%3DzwSsCeUlrVgB8gC0SPdHrdjubvllTdS1dYu16P3-fl8%26e%3D&amp;amp;source=gmail&amp;amp;ust=1778800065776000&amp;amp;usg=AOvVaw1PJJVi3oRo4rbMD2eMWsX5"&gt;https://security.&lt;WBR /&gt;paloaltonetworks.com/PAN-SA-&lt;WBR /&gt;2026-0007&lt;/A&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;BR /&gt;
&lt;DIV&gt;Please visit our Security Advisories website to learn more at&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://urldefense.proofpoint.com/v2/url?u=https-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7TwW9dLirq-2D2BIqtdrkZxFgQdKjJT-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal-2D2FF3R9CA65GGZe-2D2FJBKrXth0geqsfpZUNyeElSzNDuRW0hUC4Wf1hXknDbyOBo2sg6HdY-2D2Bo9qpMDlSHqQo45uq1k9SUJp4Vqg6n19HgfXzFmV9JWH1KpzIwLD64vcnm39XXxgv8XhQY6jD6qYCxO79go-2D3D&amp;amp;d=DwMFAg&amp;amp;c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&amp;amp;r=bCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q&amp;amp;m=ZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4&amp;amp;s=f6jdHCazWrtaGMIAoZrGb58cdmIcf_7ErYIXZ2SK2v4&amp;amp;e=" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://urldefense.proofpoint.com/v2/url?u%3Dhttps-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgHU9XR5iD9zXZRfCa5aUs7TwW9dLirq-2D2BIqtdrkZxFgQdKjJT-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal-2D2FF3R9CA65GGZe-2D2FJBKrXth0geqsfpZUNyeElSzNDuRW0hUC4Wf1hXknDbyOBo2sg6HdY-2D2Bo9qpMDlSHqQo45uq1k9SUJp4Vqg6n19HgfXzFmV9JWH1KpzIwLD64vcnm39XXxgv8XhQY6jD6qYCxO79go-2D3D%26d%3DDwMFAg%26c%3DV9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo%26r%3DbCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q%26m%3DZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4%26s%3Df6jdHCazWrtaGMIAoZrGb58cdmIcf_7ErYIXZ2SK2v4%26e%3D&amp;amp;source=gmail&amp;amp;ust=1778800065776000&amp;amp;usg=AOvVaw0zjrMT0zHcfeLBhi57HAW-"&gt;https://security.&lt;WBR /&gt;paloaltonetworks.com/&lt;/A&gt;.&lt;BR /&gt;If you have questions, please contact support&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://urldefense.proofpoint.com/v2/url?u=https-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.-2D2FB-2D2FSv-2D2FLOd4gvRdvIcMQeAaN-2D2F-2D2FPS8i6KvsOG4J7cRzEiYh4Kb9qe13uaA7TgIOI4V8eiV4IPjNGQzGe1MBcaqmA-2D3D-2D3DvVbi-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal9q7NTP4IshR9qVXhI2ODDp-2D2FrcjFzHoSU8Uw7XCJoiMsB-2D2Biz1KjhI04qy1Xd5jETiGajWLjf0sDdRWxFFfBHZeJqv-2D2F22-2D2Fo3eObUOmeSo4xTK53KVaFFj4d6gAnzbjIbR-2D2FF4T8NOpq7yvIJEfw-2D2B5Lqsc-2D3D&amp;amp;d=DwMFAg&amp;amp;c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&amp;amp;r=bCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q&amp;amp;m=ZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4&amp;amp;s=h9mCqVdf5h7UrkhqpjvY_wmXUXdlXP9nuReabGGIeP8&amp;amp;e=" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://urldefense.proofpoint.com/v2/url?u%3Dhttps-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.-2D2FB-2D2FSv-2D2FLOd4gvRdvIcMQeAaN-2D2F-2D2FPS8i6KvsOG4J7cRzEiYh4Kb9qe13uaA7TgIOI4V8eiV4IPjNGQzGe1MBcaqmA-2D3D-2D3DvVbi-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal9q7NTP4IshR9qVXhI2ODDp-2D2FrcjFzHoSU8Uw7XCJoiMsB-2D2Biz1KjhI04qy1Xd5jETiGajWLjf0sDdRWxFFfBHZeJqv-2D2F22-2D2Fo3eObUOmeSo4xTK53KVaFFj4d6gAnzbjIbR-2D2FF4T8NOpq7yvIJEfw-2D2B5Lqsc-2D3D%26d%3DDwMFAg%26c%3DV9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo%26r%3DbCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q%26m%3DZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4%26s%3Dh9mCqVdf5h7UrkhqpjvY_wmXUXdlXP9nuReabGGIeP8%26e%3D&amp;amp;source=gmail&amp;amp;ust=1778800065777000&amp;amp;usg=AOvVaw3d9mfuQbbGHHsJrgIkXYUH"&gt;https://www.paloaltonetworks.&lt;WBR /&gt;com/company/contact-support&lt;/A&gt;.&lt;/DIV&gt;
&lt;BR /&gt;
&lt;DIV&gt;Regards,&lt;/DIV&gt;
&lt;DIV&gt;Product Security Incident Response Team&lt;/DIV&gt;
&lt;DIV&gt;Palo Alto Networks&lt;/DIV&gt;
&lt;BR /&gt;
&lt;DIV&gt;This email was sent to you because you are a registered user of the Palo Alto Networks Support Portal. If you no longer wish to receive these updates, please unsubscribe by updating your profile on the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://urldefense.proofpoint.com/v2/url?u=https-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgM5sHDIzn0MQWLf76DXH0s7oO36I1EagGKlHT50TnnM9SxWXEf7esrSEM2J1IKkIqWT0pviUSg1rJMr3TO-2D2BPseM-2D3DzkQo-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal6rSBoE4bo5EgWX3MV7nU28-2D2Fkjp2HGJjTVx4iOFEt0BYekb7oTUBxvjVJ0mYFpXNpkJWCjIR5HAbX2kIRCxNCVN-2D2Fh-2D2FuAba06ASTbiEsNIiU0taIKGBJNhCYGqiS2W7z5Rqd2b3mLbp-2D2BEDrteaTHm0RA-2D3D&amp;amp;d=DwMFAg&amp;amp;c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&amp;amp;r=bCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q&amp;amp;m=ZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4&amp;amp;s=lzGFJz1tWO00hpB0A0X0oNUyqIqUOqNXPYcwKoIEbwI&amp;amp;e=" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://urldefense.proofpoint.com/v2/url?u%3Dhttps-3A__u574567.ct.sendgrid.net_ls_click-3Fupn-3Du001.Mf7MWdPSfie6Atm1eagsgM5sHDIzn0MQWLf76DXH0s7oO36I1EagGKlHT50TnnM9SxWXEf7esrSEM2J1IKkIqWT0pviUSg1rJMr3TO-2D2BPseM-2D3DzkQo-5FtyH7Xr5oHWOMgoT-2D2Fx6npQRiNlZK9uYRHnXalgH6K4bNEjD1med10YX65saElWAFEFJkGKaf5lnhYVv86vWBal6rSBoE4bo5EgWX3MV7nU28-2D2Fkjp2HGJjTVx4iOFEt0BYekb7oTUBxvjVJ0mYFpXNpkJWCjIR5HAbX2kIRCxNCVN-2D2Fh-2D2FuAba06ASTbiEsNIiU0taIKGBJNhCYGqiS2W7z5Rqd2b3mLbp-2D2BEDrteaTHm0RA-2D3D%26d%3DDwMFAg%26c%3DV9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo%26r%3DbCJRle0W1O6z2Lx8sEXtCvaaJpmZqvv4UOj1_Jk_99Q%26m%3DZYDP9uIkzzM7AjKJqjhz62BUUt5sr9DlBVC8HyNexWReuU1SeMIWPZW1qxEbesV4%26s%3DlzGFJz1tWO00hpB0A0X0oNUyqIqUOqNXPYcwKoIEbwI%26e%3D&amp;amp;source=gmail&amp;amp;ust=1778800065777000&amp;amp;usg=AOvVaw2c7KL-iaYvhJwrZ4hFkPyP"&gt;Support Portal&lt;/A&gt;.&lt;/DIV&gt;
&lt;/BLOCKQUOTE&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P style="margin: 0in;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in;"&gt;&lt;FONT size="3" color="#000000"&gt;&lt;SPAN&gt;【2026年5月13日付け全パートナー向け同報周知：事前告知】&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P style="margin: 0in;"&gt;&lt;FONT size="3" color="#000000"&gt;&lt;SPAN&gt;日本時間の2026年5月14日 (木) 午前1時 (太平洋夏時間: 5月13日 水曜 午前9時) に、弊社より8つの製品群にわたる合計26件のCVEに関する &lt;/SPAN&gt;&lt;A href="https://security.paloaltonetworks.com/" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;Palo Alto Networks Security Advisory &lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;を公開いたします 。関連する公開情報やASCパートナー各社様の支援が求められるスコープが明確になり次第、当スレッドおよびJapan LIVE CommunityのASC向け特設ページでPSM/PSAMが統一窓口となってアップデートさせていただく計画です。&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: 游ゴシック; font-size: 11.0pt; color: blue;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: 'Google Sans Text'; font-size: 11.0pt; color: blue;"&gt;&lt;STRONG&gt;&lt;FONT size="3" color="#000000"&gt;■ 本アドバイザリ公開の背景と目的&amp;nbsp;&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: 'Google Sans Text'; font-size: 11.0pt; color: blue;"&gt;&lt;FONT size="3" color="#000000"&gt;&lt;SPAN&gt;今回の多数の脆弱性公開は、Anthropic社の「Claude Mythos」をはじめとする最先端のAIモデルを弊社のコードベースに適用し、プロアクティブなディスカバリー（発見）を行った結果によるものです 。高度なAI機能が攻撃者に広く悪用される前に、弊社が先手を打って脆弱性を特定・修正し、お客様の環境を「AIによって強固に守られた状態 (AI-hardened)」にすることを目的としております 。&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: 游ゴシック; font-size: 11.0pt; color: blue;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: 'Google Sans Text'; font-size: 11.0pt; color: blue;"&gt;&lt;STRONG&gt;&lt;FONT size="3" color="#000000"&gt;■ エンドユーザー様へ周知いただきたい「3つの重要事実」&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: 'Google Sans Text'; font-size: 11.0pt; color: blue;"&gt;&lt;FONT size="3" color="#000000"&gt;&lt;SPAN&gt;お客様からの懸念の声に備え、以下の事実をベースにご対応をお願いいたします。&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;UL style="direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;" type="disc"&gt;
&lt;LI style="margin-top: 0; margin-bottom: 0; vertical-align: middle; color: blue;"&gt;&lt;FONT size="3" color="#000000"&gt;&lt;STRONG&gt;悪用の事例なし:&lt;/STRONG&gt;&lt;SPAN&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;現時点で、これらの脆弱性が悪意を持ってエクスプロイト（悪用）された事実は確認されておりません&amp;nbsp;。&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/LI&gt;
&lt;LI style="margin-top: 0; margin-bottom: 0; vertical-align: middle; color: blue;"&gt;&lt;FONT size="3" color="#000000"&gt;&lt;STRONG&gt;クラウドインフラは保護済み:&lt;/STRONG&gt;&lt;SPAN&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;Cortexプラットフォームやクラウド配信型のネットワークセキュリティ製品などにつきましては、すでに保護機能が有効化されており、お客様側での対応は不要です&amp;nbsp;。&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/LI&gt;
&lt;LI style="margin-top: 0; margin-bottom: 0; vertical-align: middle; color: blue;"&gt;&lt;FONT size="3" color="#000000"&gt;&lt;STRONG&gt;オンプレミス向けパッチの提供:&lt;/STRONG&gt;&lt;SPAN&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;PAN-OSやGlobalProtectなど、広く導入されているオンプレミスソフトウェアのすべてのリリースに対して、修正版バージョンがアドバイザリ公開と同時に利用可能となります&amp;nbsp;。&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P style="margin: 0in; margin-left: .375in; font-family: 游ゴシック; font-size: 11.0pt; color: blue;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: 'Google Sans Text'; font-size: 11.0pt; color: blue;"&gt;&lt;STRONG&gt;&lt;FONT size="3" color="#000000"&gt;■ ASCパートナー様向けのサポートツールと体制&amp;nbsp;&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: 'Google Sans Text'; font-size: 11.0pt; color: blue;"&gt;&lt;FONT size="3" color="#000000"&gt;&lt;SPAN&gt;アドバイザリ公開後、エンドユーザー様からの急な問い合わせ対応など、皆様には多大なるご負担をおかけすることと存じます。相互のお客様の自己解決能力を高め、皆様の業務負荷を軽減するため、以下のツールを強化・提供いたします 。&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;UL style="direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;" type="disc"&gt;
&lt;LI style="margin-top: 0; margin-bottom: 0; vertical-align: middle; color: blue;"&gt;&lt;FONT size="3" color="#000000"&gt;&lt;STRONG&gt;CSP (カスタマーサポートポータル) の強化:&lt;/STRONG&gt;&lt;SPAN&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;アドバイザリデータや外部の脅威情報を学習した「CSP-Copilot」が自動応答でサポートを支援します 。また、「CSP Asset View」により、お客様ご自身で高深刻度CVEに対するエクスポージャー状況を追跡可能となります（24時間ごとに更新） 。&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/LI&gt;
&lt;LI style="margin-top: 0; margin-bottom: 0; vertical-align: middle; color: blue;"&gt;&lt;FONT size="3" color="#000000"&gt;&lt;STRONG&gt;Questスキャンツール:&lt;/STRONG&gt;&lt;SPAN&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;テクニカルサポートファイル（TSF）スキャンにより、お客様の環境のリスクや潜在的なエクスプロイトを特定するためのCVEシグネチャが実装されております 。&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P style="margin: 0in; margin-left: .375in; font-family: 游ゴシック; font-size: 11.0pt; color: blue;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: 'Google Sans Text'; font-size: 11.0pt; color: blue;"&gt;&lt;FONT size="3" color="#000000"&gt;&lt;SPAN&gt;今回のAIを活用したプロアクティブ対応は一時的なものではなく、今後の「AI主導の防衛 (AI-Speed Defense)」に向けた日常的プロセスへの移行を見据えたものです 。&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: 'Google Sans Text'; font-size: 11.0pt; color: blue;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: 'Google Sans Text'; font-size: 11.0pt; color: blue;"&gt;&lt;FONT size="3" color="#000000"&gt;&lt;SPAN&gt;本件に関してご不明な点や、お客様対応で困難な状況が発生した場合は、担当のパートナーサービスマネージャー（PSM）またはサポート窓口まで遠慮なくご相談ください。引き続き、皆様との強固なパートナーシップにより、日本のお客様の安全維持に努める所存です。&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;/DIV&gt;</description>
      <pubDate>Thu, 14 May 2026 00:27:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/asc%E3%83%97%E3%83%AD%E3%82%B0%E3%83%A9%E3%83%A0%E3%83%89%E3%82%AD%E3%83%A5%E3%83%A1%E3%83%B3%E3%83%88/frontier-ai%E3%83%A2%E3%83%87%E3%83%AB%E6%B4%BB%E7%94%A8%E3%81%AB%E3%82%88%E3%82%8B%E8%84%86%E5%BC%B1%E6%80%A7%E5%AF%BE%E5%BF%9C%E3%83%97%E3%83%AD%E3%82%BB%E3%82%B9/ta-p/1253887</guid>
      <dc:creator>ymukae</dc:creator>
      <dc:date>2026-05-14T00:27:12Z</dc:date>
    </item>
  </channel>
</rss>

