Discover what’s really driving the shift toward unified security
Discover how geopolitical tensions are fueling advanced cyber campaigns
Is the Quantum Threat Closer Than You Think?
  • Sign In
    • Customer
    • Partner
    • Employee
    • Login to download
    • Join us to become a member
  • EN
  • magnifying glass search icon to open search field
  • Contact Us
  • What's New
  • Get Support
  • Under Attack?
Palo Alto Networks logo
  • Products
  • Solutions
  • Services
  • Partners
  • Company
  • More
  • Sign In
    Sign In
    • Customer
    • Partner
    • Employee
    • Login to download
    • Join us to become a member
  • EN
    Language
  • Contact Us
  • What's New
  • Get support
  • Under Attack?
  • Demos and Trials

Palo Alto Networks Product Security Assurance and Vulnerability Disclosure Policy

Overview

As the world’s cybersecurity leader, our technologies give our enterprise customers the power to protect billions of people worldwide. Our products are designed with the highest security assurance standards in all aspects of a product lifecycle to help deliver highly trusted and secure products. Our product security assurance practices are based on recognized international standards such as ISO/IEC 29147:2018 (vulnerability disclosure), ISO/IEC 30111:2019 (vulnerability handling) and FIRST PSIRT Services Framework 1.0.

We are deeply committed to help ensure the safety and security of our customers. Our policies and practices are guided by our core corporate values of disruption, execution, collaboration, integrity, and inclusion.

Scope

Palo Alto Networks’ product security assurance practices cover all our products that have not reached the End-of-Life (EoL) milestone. These include hardware, software and SaaS products (cloud services) and products delivered by our wholly-owned subsidiaries. This policy also covers any open source project such as those hosted at https://github.com/PaloAltoNetworks, unless stated otherwise.

Product Security Incident Response Team

Palo Alto Networks Product Security Incident Response Team (PSIRT) is a team of dedicated security professionals who work vigilantly to help keep our customers safe. It is chartered to oversee receiving, identification, assessment, remediation, verification and publication of advisories for security vulnerabilities discovered in our products and services.

 

Reporting Vulnerabilities

Vulnerabilities in our products can be reported to our PSIRT in different ways:

Vulnerability reporting form here

Email us at psirt@paloaltonetworks.com. For additional security, you can find our Pretty Good Privacy (PGP) key here.

Customers have an additional option of reporting issues through a customer support case.

We honor Traffic Light Protocol (TLP) labels when sensitive information is shared with us. Any sensitive non-public information about vulnerabilities is considered highly confidential, and only individuals from PSIRT and product engineering who have a legitimate need to know and may add value to the remediation processes get access to this information.

To help protect our customers, we request that you not post or share any information about a potential vulnerability in any public setting until we have researched, responded to, and addressed the reported vulnerability, and if needed, inform customers through a security advisory.

Please submit requests for adding signatures to detect or block new or variations of attacks or malware directly to customer support. We encourage security researchers and software vendors to send us vulnerability information that can help us provide better protections to customers faster. Palo Alto Networks is a member of the Microsoft Active Protections Program (MAPP).

Issues in Palo Alto Networks IT infrastructure should be reported to https://paloaltonetworks.responsibledisclosure.com

 

Response and remediation process

Receipts of vulnerability reports are usually acknowledged within a US business day with a tracking number. The reports are then analyzed and reproduced by appropriate product security engineers. Once the problem has been confirmed and understood, our product engineering team works on resolving the issues across all affected and supported releases of the product. Our product security engineers review and verify the remediations.

Proactive vulnerability remediation

We proactively conduct routine security assessments internally and through security penetration testing partners to find vulnerabilities. We monitor security advisories for open source and third-party software used in Palo Alto Networks products and take appropriate remediation where necessary.

Palo Alto Networks PSIRT oversees the entire vulnerability response and remediation process from start to finish across all products. When remediation of an issue is completely in our hands, our SaaS products (cloud services) are fixed in a matter of hours or days. Our on-premise products that have a regular maintenance release and test schedules are completely resolved to the best of our ability well within 90 days for most issues.

Secure software development and maintenance

Security by Design: Palo Alto Networks applies secure by design principles throughout the software development lifecycle. Our comprehensive approach to securing our customers and our company including our products and services is detailed in our Trust 360 Program Document.

 

Response Prioritization

We use CVSS version 4.0 (CVSS-B, and CVSS-BT scores) to score vulnerabilities and consider several factors such as active exploitation, customer exposure, and public disclosure timelines while prioritizing response actions for issues. The Base Score (CVSS-B) reflects the severity of a vulnerability according to its intrinsic characteristics which are constant over time. The Threat Metrics (CVSS-BT) adjust the severity of a vulnerability based on factors, such as the availability of proof-of-concept code or active exploitation.



Any vulnerability with active exploitation (“0-day”) against Palo Alto Networks or publicly known vulnerabilities with high exploitation potential would be responded with utmost urgency.

We remediate and publish advisories for vulnerabilities irrespective of who found them. Issues may be discovered by external researchers, found during internal testing, encountered by customers or reported by other organizations and vendors.

Any issues that have a low severity rating with CVSS base score less than 4.0 and can be easily mitigated with current best practices, or security improvements or defensive programming fixes with no real or proven impact to customers are usually addressed in future releases of our products and do not necessarily result in a security advisory. Such issues are documented in our informational bulletins or in product release notes.

There can be exceptional issues which cannot be sufficiently fixed or mitigated in a reasonable timeline. Such issues may require actions by standardization organizations, or depend on an upstream organization to deliver fixes or require inventing a new hardware architecture. In such cases, we may publish an advisory with possible mitigations and workarounds, but no remediations involving a product change.

 

Multiparty Vulnerability Coordination

When we receive or discover vulnerabilities that may affect products of multiple other vendors, Palo Alto Networks PSIRT will strive to engage in responsible multiparty vulnerability coordinated disclosure following guidelines from FIRST.org. Such coordination is usually initiated in agreement with the reporter.

 

Security Advisories

We publish security advisories to warn customers about security vulnerabilities in our products at https://security.paloaltonetworks.com/. Our advisories may include information about the affected versions, worst-case impact, required configurations, any available workarounds, fixed versions, CVE IDs, CWE IDs, CVSS scores, CPE Names, and acknowledgements to persons discovering the issue. We aim to avoid including information that may help miscreants exploit the vulnerabilities.

Except for critical issues with active exploitation, security advisories are published only after fixes are available for all supported releases of a product on a predetermined monthly schedule. Advisories are published on the second Wednesday of every month at 09:00 AM Pacific Standard Time.

When possible Palo Alto Networks Focused Services team is briefed about upcoming security advisories to provide personalized support, release review and upgrade planning assistance to customers. Partners leveraging Palo Alto Networks products to secure important critical infrastructure are proactively informed about product vulnerabilities.

Advisories for any critical issues with active exploitation are published out of cycle as soon as practicable.

We do not publish advisories for general security improvements and defensive programming fixes that do not have a proven security impact.

We do not publish advisories for vulnerabilities in our SaaS (cloud services) products when an issue can be completely resolved by Palo Alto Networks, without requiring any customer action. We may publish a maintenance log of resolved vulnerabilities that are updated when issues are resolved. For vulnerabilities affecting both our SaaS and on-premise products, we aim to upgrade all SaaS deployments before issuing an advisory to minimize customer risk.

Palo Alto Networks is a CVE Numbering Authority (CNA). Our CVE assignment scope includes all Palo Alto Networks products and vulnerabilities discovered in any third-party product not covered by another CNA. We adhere to the CNA Operational Rules to identify, define, catalog, and share information about our disclosed vulnerabilities using CVE IDs and CVE Records.

Customers can subscribe to email notifications of new security advisories and important updates. Customers can also subscribe to our security advisories RSS feed using their preferred RSS reader or any other software they use to receive RSS feed updates (eg: Slack). All published vulnerabilities get a CVE ID assigned and entered into the CVE corpus, as well as in the National Vulnerability Database.

 

Acknowledgement Policy

We deeply appreciate the effort involved in discovering and researching security vulnerabilities. As a sincere token of our gratitude, we acknowledge those who have discovered or have helped fix vulnerabilities with an acknowledgment statement on our security advisories. If an advisory is not published, we include the researcher on our hall of fame page (for example: SaaS products, or security improvements or defensive fixes).

We acknowledge reporters if they permit us to thank them. Acknowledgements are also recorded in the associated CVE records in the CVE corpus if any. We may not acknowledge certain names or reporters if circumstances warrant as such.

We have a bug bounty program for security vulnerabilities in our products. Please see our bug bounty information page for details.

 

Escalation path

If you are unhappy with how we have responded or if you do not get a response to an issue please escalate the issue through Palo Alto Networks customer support.

Legal notes

We encourage security researchers to come forward with their findings and report them to us without fear of legal consequences. Palo Alto Networks does not intend to engage in legal action against any researcher who has performed research according to current best practices for conducting and reporting vulnerability research. Security research must make good faith efforts to avoid violating any law, avoid any action that could negatively impact the confidentiality, integrity or availability of information and systems of either Palo Alto Networks or its customers.

Disclaimer

All aspects of this Palo Alto Networks Product Security Assurance and Vulnerability Disclosure Policy are subject to change without notice at any time. Response is not guaranteed for any specific issue or class of issues. Your use of the information on the policy or materials linked from the policy is at your own risk.

Change history

  • Updated: November 7, 2023: Updated the policy to indicate the use of CVSS 4.0 for scoring vulnerabilities.
  • Published: December 7, 2019. This policy shall take effect January 1, 2020.

 

Get the latest news, invites to events, and threat alerts

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

Products and Services

  • AI-Powered Network Security Platform
  • Secure AI by Design
  • Prisma AIRS
  • AI Access Security
  • Cloud Delivered Security Services
  • Advanced Threat Prevention
  • Advanced URL Filtering
  • Advanced WildFire
  • Advanced DNS Security
  • Enterprise Data Loss Prevention
  • Enterprise IoT Security
  • Medical IoT Security
  • Industrial OT Security
  • SaaS Security
  • Next-Generation Firewalls
  • Hardware Firewalls
  • Software Firewalls
  • Strata Cloud Manager
  • SD-WAN for NGFW
  • PAN-OS
  • Panorama
  • Secure Access Service Edge
  • Prisma SASE
  • Application Acceleration
  • Autonomous Digital Experience Management
  • Enterprise DLP
  • Prisma Access
  • Prisma Access Browser
  • Prisma SD-WAN
  • Remote Browser Isolation
  • SaaS Security
  • AI-Driven Security Operations Platform
  • Cloud Security
  • Cortex Cloud
  • Application Security
  • Cloud Posture Security
  • Cloud Runtime Security
  • Prisma Cloud
  • AI-Driven SOC
  • Cortex XSIAM
  • Cortex XDR
  • Cortex XSOAR
  • Cortex Xpanse
  • Unit 42 Managed Detection & Response
  • Managed XSIAM
  • Threat Intel and Incident Response Services
  • Proactive Assessments
  • Incident Response
  • Transform Your Security Strategy
  • Discover Threat Intelligence

Company

  • About Us
  • Careers
  • Contact Us
  • Corporate Responsibility
  • Customers
  • Investor Relations
  • Location
  • Newsroom

Popular Links

  • Blog
  • Communities
  • Content Library
  • Cyberpedia
  • Event Center
  • Manage Email Preferences
  • Products A-Z
  • Product Certifications
  • Report a Vulnerability
  • Sitemap
  • Tech Docs
  • Unit 42
  • Do Not Sell or Share My Personal Information
PAN logo
  • Privacy
  • Trust Center
  • Terms of Use
  • Documents

Copyright © 2025 Palo Alto Networks. All Rights Reserved

  • Youtube
  • Podcast
  • Facebook
  • LinkedIn
  • Twitter
  • Select your language