<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: I have a question CVE-2026-0256 PAN-OS in VM-Series in the Public Cloud</title>
    <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/i-have-a-question-cve-2026-0256-pan-os/m-p/1254256#M2459</link>
    <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/270791"&gt;@JiHwanHam&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;what Palo Alto is suggesting in the advisory:&amp;nbsp;&lt;A href="https://security.paloaltonetworks.com/CVE-2026-0256" target="_self"&gt;CVE-2026-0256&lt;/A&gt;&amp;nbsp;is beyond what you can achieve with permitted IP address list for management interface. If you do inbound inspection for management interface and block the&amp;nbsp;&lt;SPAN&gt;Threat ID 510020 you can inspect and block attack regardless from what IP address attack comes from or who attacker is.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;To exploit this vulnerability an attacker either already has credentials (which would be bigger problem) or legitimate admin exploits this vulnerability.&amp;nbsp;&amp;nbsp;I agree with you that if you do not have interface exposed to internet and have only internal permitted IP addresses the risk is minimized unless one of your admins from permitted IPs exploits this vulnerability. This is likely reason it has medium severity and low EPSS score.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Kind Regards&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Pavel&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 19 May 2026 06:17:21 GMT</pubDate>
    <dc:creator>PavelK</dc:creator>
    <dc:date>2026-05-19T06:17:21Z</dc:date>
    <item>
      <title>I have a question CVE-2026-0256 PAN-OS</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/i-have-a-question-cve-2026-0256-pan-os/m-p/1254138#M2454</link>
      <description>&lt;PRE id="tw-target-text" class="tw-data-text tw-text-large tw-ta" dir="ltr" tabindex="-1" role="text" aria-label="번역된 텍스트: Hello.

I have a question regarding this vulnerability. The vulnerability description states that a malicious authenticated administrator could save a payload via XSS. If that is the case, wouldn't the vulnerability itself be fine as long as the Permitted IP is properly configured? However, I do not quite understand why the suggested solution involves changing the service root and resolving the issue through a TP license, so I am asking this question.

To put it simply, I would like to ask if I do not need to update the OS if a Public IP is not assigned to the MGT and the Administrator ID is configured correctly." data-ved="2ahUKEwjmr9n16L-UAxVMV-sIHcIXExwQ3ewLegQIDRAV" data-placeholder="번역"&gt;&amp;nbsp;&lt;/PRE&gt;
&lt;P&gt;Hello.&lt;/P&gt;
&lt;P&gt;I have a question regarding this vulnerability. The vulnerability description states that a malicious authenticated administrator could save a payload via XSS. If that is the case, wouldn't the vulnerability itself be fine as long as the Permitted IP is properly configured? However, I do not quite understand why the suggested solution involves changing the service root and resolving the issue through a TP license, so I am asking this question.&lt;/P&gt;
&lt;P&gt;To put it simply, I would like to ask if I do not need to update the OS if a Public IP is not assigned to the MGT and the Administrator ID is configured correctly.&lt;/P&gt;</description>
      <pubDate>Sun, 17 May 2026 07:43:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/i-have-a-question-cve-2026-0256-pan-os/m-p/1254138#M2454</guid>
      <dc:creator>JiHwanHam</dc:creator>
      <dc:date>2026-05-17T07:43:28Z</dc:date>
    </item>
    <item>
      <title>Re: I have a question CVE-2026-0256 PAN-OS</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/i-have-a-question-cve-2026-0256-pan-os/m-p/1254140#M2456</link>
      <description>&lt;P&gt;Changing service root and applying threat prevention is under "workaround" section in case you need to open access to mgmt interface but can't upgrade PANOS.&lt;/P&gt;</description>
      <pubDate>Sun, 17 May 2026 18:10:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/i-have-a-question-cve-2026-0256-pan-os/m-p/1254140#M2456</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2026-05-17T18:10:38Z</dc:date>
    </item>
    <item>
      <title>Re: I have a question CVE-2026-0256 PAN-OS</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/i-have-a-question-cve-2026-0256-pan-os/m-p/1254256#M2459</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/270791"&gt;@JiHwanHam&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;what Palo Alto is suggesting in the advisory:&amp;nbsp;&lt;A href="https://security.paloaltonetworks.com/CVE-2026-0256" target="_self"&gt;CVE-2026-0256&lt;/A&gt;&amp;nbsp;is beyond what you can achieve with permitted IP address list for management interface. If you do inbound inspection for management interface and block the&amp;nbsp;&lt;SPAN&gt;Threat ID 510020 you can inspect and block attack regardless from what IP address attack comes from or who attacker is.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;To exploit this vulnerability an attacker either already has credentials (which would be bigger problem) or legitimate admin exploits this vulnerability.&amp;nbsp;&amp;nbsp;I agree with you that if you do not have interface exposed to internet and have only internal permitted IP addresses the risk is minimized unless one of your admins from permitted IPs exploits this vulnerability. This is likely reason it has medium severity and low EPSS score.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Kind Regards&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Pavel&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 19 May 2026 06:17:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/i-have-a-question-cve-2026-0256-pan-os/m-p/1254256#M2459</guid>
      <dc:creator>PavelK</dc:creator>
      <dc:date>2026-05-19T06:17:21Z</dc:date>
    </item>
  </channel>
</rss>

