An improper certificate validation vulnerability in the Prisma Access Agent® for Android and Chrome OS enables an attacker to perform a man-in-the-middle (MitM) attack to intercept VPN traffic. By presenting a certificate for any domain issued by a trusted Certificate Authority, the attacker can capture sensitive device information.
The Prisma Access Agent on macOS, Windows, Linux and iOS are not affected.
Description: CAPEC-94 Adversary in the Middle (AiTM)
Solutions
Version Minor Version Suggested Solution
Prisma Access Agent on Android 25.0 through 26.2 Upgrade to 26.2.1 or later.
Prisma Access Agent Chrome OS 25.0 through 26.2 Upgrade to 26.2.1 or later.
Prisma Access Agent on iOS No action needed
Prisma Access Agent on Linux No action needed
Prisma Access Agent on macOS No action needed
Prisma Access Agent on Windows No action needed
Configurations
No special configuration is required.
Workarounds
No known workarounds exist for this issue.
Exploits
Palo Alto Networks is not aware of any malicious exploitation of this issue.
Credits
other
Palo Alto Networks thanks our internal security research teams for discovering and reporting this issue.