<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Is PAN-OS affrected by the glibc vulnerabilities? in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/is-pan-os-affrected-by-the-glibc-vulnerabilities/m-p/1247868#M6680</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/55776"&gt;@MasaW&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The authoritative source for Palo Alto Networks product exposure and fixes is our&lt;A href="https://security.paloaltonetworks.com/" target="_self"&gt; Security Advisories portal&lt;/A&gt;. At this time, we do not see published PAN-OS advisories for CVE-2026-0915, CVE-2026-0861, or CVE-2025-15281.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If Palo Alto Networks determines any impact to PAN-OS (or Prisma Access), an advisory will be published with affected versions and remediation guidance. I recommend subscribing to the advisory RSS/notifications for updates.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 10 Feb 2026 13:40:01 GMT</pubDate>
    <dc:creator>JayGolf</dc:creator>
    <dc:date>2026-02-10T13:40:01Z</dc:date>
    <item>
      <title>Is PAN-OS affrected by the glibc vulnerabilities?</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/is-pan-os-affrected-by-the-glibc-vulnerabilities/m-p/1247844#M6677</link>
      <description>&lt;P&gt;Attention: Global TPM team,&lt;/P&gt;
&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is PAN-OS affected by the below glibc vulnerabilities?&lt;BR /&gt;----&lt;BR /&gt;CVE-2026-0915&lt;BR /&gt;CVE-2026-0861&lt;BR /&gt;CVE-2025-15281&lt;BR /&gt;----&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Best regards,&lt;BR /&gt;MasaW&lt;/P&gt;</description>
      <pubDate>Tue, 10 Feb 2026 08:20:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/is-pan-os-affrected-by-the-glibc-vulnerabilities/m-p/1247844#M6677</guid>
      <dc:creator>MasaW</dc:creator>
      <dc:date>2026-02-10T08:20:13Z</dc:date>
    </item>
    <item>
      <title>Re: Is PAN-OS affrected by the glibc vulnerabilities?</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/is-pan-os-affrected-by-the-glibc-vulnerabilities/m-p/1247868#M6680</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/55776"&gt;@MasaW&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The authoritative source for Palo Alto Networks product exposure and fixes is our&lt;A href="https://security.paloaltonetworks.com/" target="_self"&gt; Security Advisories portal&lt;/A&gt;. At this time, we do not see published PAN-OS advisories for CVE-2026-0915, CVE-2026-0861, or CVE-2025-15281.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If Palo Alto Networks determines any impact to PAN-OS (or Prisma Access), an advisory will be published with affected versions and remediation guidance. I recommend subscribing to the advisory RSS/notifications for updates.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Feb 2026 13:40:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/is-pan-os-affrected-by-the-glibc-vulnerabilities/m-p/1247868#M6680</guid>
      <dc:creator>JayGolf</dc:creator>
      <dc:date>2026-02-10T13:40:01Z</dc:date>
    </item>
  </channel>
</rss>

