Prisma logo
  • Products
    Products
    Platform
    • Prisma Cloud
      Protect applications from code to cloud
    Categories
    • Cloud Security Posture Management
      Gain visibility, compliance and governance across multicloud environments
    • Cloud Workload Protection
      Secure host, containers, Kubernetes (K8s) and serverless functions
    • Application Security
      Shift left and secure applications by design
    • Cloud Infrastructure Entitlement Management Enforce least privilege access to cloud infrastructure
    • Web Application & API Security Protect applications and APIs against web based attacks
    • Cloud Network Security Secure the network that connects applications
    • Cloud Discovery & Exposure Management Combat rogue cloud deployments
    • Data Security Posture Management Classify and secure sensitive data
    • AI Security Posture Management Secure AI powered applications
  • Solutions
    Solutions
    Use Cases
    • Risk Prevention
    • Secure code by design
    • Fix misconfigurations in IaC
    • Manage OSS vulnerabilities (SCA)
    • Avoid secrets exposure
    • Protect CI/CD pipelines
    • Visibility & Control
    • Detect misconfigurations
    • Generate compliance reports
    • Reduce excessive permissions
    • Prevent cloud data breaches
    • Manage shadow clouds
    • Vulnerability management
    • Runtime Protection
    • Detect threats
    • Container and Kubernetes security
    • Protect Hosts / VMs
    • Defend serverless functions
    • Protect web applications
    • API security
    Industries
    • Government
  • Environments
    Environments
    Environments We Secure
    • Cloud Service Providers
    • Alibaba Cloud
    • Amazon Web Services
    • Google Cloud
    • Microsoft Azure
    • Oracle Cloud Infrastructure
    • Application Platforms
    • Docker
    • Kubernetes
    • Red Hat OpenShift
    • ServiceNow
    • VMWare Tanzu
    • Cloud Automation
    • HashiCorp
  • Product Tour
  • Resources
    Resources
    Product Information
    • Datasheets
    • Explore Demos
    • Technical Documentation
    • Knowledge Base
    • Support
    • Professional Services
    • Technology Partners
    • Open Source
    Learn & Connect
    • Blog
    • Research
    • DevSecTalks
    • Cloud Security Cyberpedia
    • Customer Success Stories
    • Analyst & Research Reports
    • Whitepapers
    • eBooks
    • Bootcamps
    • Videos
    • Developer Resources
    The State of Cloud-Native Security 2024 Report
    CXO Research
    The State of Cloud-Native Security 2024 Report
    Get your copy
    The Complete Cloud Security Platform.<br>End-to-End of Story.
    ON-DEMAND VIRTUAL EVENT
    The Complete Cloud Security Platform.
    End-to-End of Story.
    Watch now
palo alto networks logo icon white arrow icon pointing left to return to main Palo Alto Networks site
Search
  • Tech Docs

Security Disclosure

Our team of dedicated security professionals works vigilantly to keep customer information secure. We recognize the important role that security researchers and our community play in keeping Palo Alto Networks and our customers secure. If you discover a product or website vulnerability, please notify us using the guidelines below.

Report a vulnerability specific to a Palo Alto Networks product

or email us at PSIRT@PaloAltoNetworks.com. For additional security, you can find our PGP key here.
Learn more about our Product Security Assurance and Vulnerability Disclosure Policy.

Submit Palo Alto Networks Product Vulnerability

Report any other (non-product) vulnerability involving Palo Alto Networks

i.e. vulnerabilities affecting paloaltonetworks.com

Submit Non-Product Related Vulnerability

View our Security Researcher Acknowledgements. Product Security Researcher Acknowledgements are currently located within the specific security advisory.

Guidelines for Responsible Disclosure Program

Palo Alto Networks follows the principle of Coordinated Vulnerability Disclosure. When Palo Alto Networks receives a security vulnerability report, we work as quickly as possible to develop an update and release it to our customers, so they can be protected.

We ask the security community to give us an opportunity to fix vulnerabilities before releasing information publicly and to follow the guidelines below:

Please do

  • Share the security issue with us before making it public on social media, message boards, mailing lists, conference talks, and other forums.
  • Provide full details of the security issue including steps to reproduce and the details of the system where the tests were conducted.
  • Wait until notified that the vulnerability has been resolved before disclosing it to others. We take the security of our customers very seriously, however some vulnerabilities take longer than others to resolve. There are several teams involved in working on these vulnerabilities depending on the vulnerability and the function being exploited.
  • If you are planning to present at a conference, let us know the date as soon as possible.

Please do not

  • Cause potential or actual damage to Palo Alto Networks users, systems or applications.
  • Use an exploit to view unauthorized data or corrupt data.
  • Request compensation for the reporting of security issues either to Palo Alto Networks, or through any external marketplace for vulnerabilities, whether black-market or otherwise.
  • Engage in disruptive testing like DoS or any action that could impact the confidentiality, integrity or availability of information and systems
  • Engage in social engineering or phishing of customers or employees
  • Request for compensation for time and materials or vulnerabilities discovered

Responsible Disclosure Policy

(applies to Non-Product Vulnerability Disclosures)

Accepted Web Vulnerabilities:

  • OWASP Top 10 vulnerability categories
  • Other vulnerabilities with demonstrated impact

Out of Scope Web Vulnerabilities:

  • Theoretical vulnerabilities
  • Informational disclosure of non-sensitive data
  • Low impact and/or Low Likelihood of occurrence session management issues
  • Self XSS (user defined payload)

Rules of Engagement

  • No Denial of Service testing
  • No Physical or Social Engineering
  • No testing of Third-party Services
  • No uploading of any vulnerability or client-related content to third-party utilities (e.g. Github, DropBox, YouTube)
  • All attack payload data must use professional language
  • If able to gain access to a system, accounts, users, or user data, stop at the point of recognition and report. Do attempt to determine how much more is accessible.
  • Low Impact Vulnerabilities are out of scope (see details below)

Responsible Disclosure Details for Web Vulnerabilities

The following vulnerabilities are considered a very low impact and hence are out of scope for our Responsible Disclosure program. 

  • Account/e-mail enumeration using brute-force attacks
    • Valid user account/email enumeration not requiring brute-force will be considered
  • Any low impact issues related to session management (i.e. concurrent sessions, session expiration, password reset/change log out, etc.)
  • Bypassing content restrictions in uploading a file without proving the file was received
  • Clickjacking/UI redressing
  • Client-side application/browser autocomplete or saved password/credentials
  • Descriptive or verbose error pages without proof of exploitability or obtaining sensitive information
  • Directory structure enumeration (unless the fact reveals exceptionally useful information)
  • Incomplete or missing SPF/DMARC/DKIM records
  • Issues related to password/credential strength, length, lockouts, or lack of brute-force/rate limiting protections
    • Account compromises (especially admin) as a result of these issues will likely be considered VALID
  • Lack of SSL or Mixed content
    • Leaking Session Cookies, User Credentials, or other sensitive data will be reviewed on a case by case basis
    • If leaking of sensitive data requires MiTM positioning to exploit, it will be considered out of scope
  • Login/Logout/Unauthenticated/Low-impact CSRF
    • CSRF Vulnerabilities may be acceptable if they are of higher impact. Examples of low impact CSRF include: Add/Delete from Cart, Add/remove wishlist/favorites, Nonsevere preference options, etc.
  • Low impact Information disclosures (including Software version disclosure)
  • Missing Cookie flags
  • Missing/Enabled HTTP Headers/Methods which do not lead directly to a security vulnerability
  • Reflected file download attacks (RFD)
  • Self-exploitation (i.e. password reset links or cookie reuse)
  • SSL/TLS best practices that do not contain a fully functional proof of concept
  • URL/Open Redirection
  • Use of a known-vulnerable library which leads to a low-impact vulnerability (i.e. jQuery outdated version leads to low impact XSS)
  • Valid bugs or best practice issues that are not directly related to the security posture of the client
  • Vulnerabilities affecting users of outdated browsers, plugins or platforms
  • Vulnerabilities that allow for the injection of arbitrary text without allowing for hyperlinks, HTML, or JavaScript code to be injected
  • Vulnerabilities that require the user/victim to perform extremely unlikely actions (i.e. Self-XSS)
    • Self-XSS for a Persistent/Stored XSS will be considered. Please review the Self-XSS article for more information.
    • Any type of XSS that requires a victim to press an unlikely key combination is NOT in scope (i.e. alt+shift+x for payload execution)

Additional specific vulnerability types considered out of scope due to low impact:

  • IIS Tilde File and Directory Disclosure
  • SSH Username Enumeration
  • Wordpress Username Enumeration
  • SSL Weak Ciphers/ POODLE
  • CSV Injection
  • PHP Info
  • Server-Status if it does not reveal sensitive information
  • Snoop Info Disclosures

Get the latest news, invites to events, and threat alerts

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

Products and Services

  • AI-Powered Network Security Platform
  • Secure AI by Design
  • Prisma AIRS
  • AI Access Security
  • Cloud Delivered Security Services
  • Advanced Threat Prevention
  • Advanced URL Filtering
  • Advanced WildFire
  • Advanced DNS Security
  • Enterprise Data Loss Prevention
  • Enterprise IoT Security
  • Medical IoT Security
  • Industrial OT Security
  • SaaS Security
  • Next-Generation Firewalls
  • Hardware Firewalls
  • Software Firewalls
  • Strata Cloud Manager
  • SD-WAN for NGFW
  • PAN-OS
  • Panorama
  • Secure Access Service Edge
  • Prisma SASE
  • Application Acceleration
  • Autonomous Digital Experience Management
  • Enterprise DLP
  • Prisma Access
  • Prisma Access Browser
  • Prisma SD-WAN
  • Remote Browser Isolation
  • SaaS Security
  • AI-Driven Security Operations Platform
  • Cloud Security
  • Cortex Cloud
  • Application Security
  • Cloud Posture Security
  • Cloud Runtime Security
  • Prisma Cloud
  • AI-Driven SOC
  • Cortex XSIAM
  • Cortex XDR
  • Cortex XSOAR
  • Cortex Xpanse
  • Unit 42 Managed Detection & Response
  • Managed XSIAM
  • Threat Intel and Incident Response Services
  • Proactive Assessments
  • Incident Response
  • Transform Your Security Strategy
  • Discover Threat Intelligence

Company

  • About Us
  • Careers
  • Contact Us
  • Corporate Responsibility
  • Customers
  • Investor Relations
  • Location
  • Newsroom

Popular Links

  • Blog
  • Communities
  • Content Library
  • Cyberpedia
  • Event Center
  • Manage Email Preferences
  • Products A-Z
  • Product Certifications
  • Report a Vulnerability
  • Sitemap
  • Tech Docs
  • Unit 42
  • Do Not Sell or Share My Personal Information
PAN logo
  • Privacy
  • Trust Center
  • Terms of Use
  • Documents

Copyright © 2025 Palo Alto Networks. All Rights Reserved

  • Youtube
  • Podcast
  • Facebook
  • LinkedIn
  • Twitter
  • Select your language