CVE-2026-4760
Unauthorized File Read Access in Panorama Web HMI Server
Publication date: 2026-03-25
Last updated on: 2026-03-26
Assigner: 30aa36b7-a224-4bc9-b7d3-abea20aa4887
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| panorama | panorama_suite | to PS-2210-02-4079 (exc) |
| panorama | panorama_suite | to PS-2300-82-3078 (exc) |
| panorama | panorama_suite | to PS-2500-04-1078 (exc) |
| panorama | panorama_suite | to PS-2510-04-1077 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-552 | The product makes files or directories accessible to unauthorized actors, even though they should not be. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Panorama Web HMI system, where an attacker can gain read access to certain server files if they know the file paths and if those files are accessible to the Servin process execution account.
The issue affects multiple versions of the Panorama Suite, including 2022-SP1, 2023, 2025, and 2025 Updated Dec. 25, unless specific updates are installed to fix the vulnerability.
How can this vulnerability impact me? :
An attacker exploiting this vulnerability can read sensitive files on the Web HMI server, potentially exposing confidential information or system details that could be used for further attacks.
Since the attacker does not need privileges beyond knowing file paths and the files being accessible to the Servin process, this could lead to unauthorized disclosure of information.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, ensure that your Panorama Suite installations are updated with the appropriate patches as specified:
- For Panorama Suite 2022-SP1 (22.50.005), install update PS-2210-02-4079 or higher.
- For Panorama Suite 2023 (23.00.004), install updates PS-2300-03-3078 or higher, PS-2300-04-3078 or higher, and PS-2300-82-3078 or higher.
- For Panorama Suite 2025 (25.00.016), install updates PS-2500-02-1078 or higher and PS-2500-04-1078 or higher.
- For Panorama Suite 2025 Updated Dec. 25 (25.10.007), install updates PS-2510-02-1077 or higher and PS-2510-04-1077 or higher.
Refer to security bulletin BS-035 on the Panorama CSIRT website for more details: https://my.codra.net/en-gb/csirt
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability involves unauthorized read access to certain Web HMI server files if their paths are known and accessible to the Servin process execution account.
Detection on your system would involve verifying the Panorama Suite version and checking if the required security updates are installed:
- For Panorama Suite 2022-SP1 (22.50.005), ensure update PS-2210-02-4079 or higher is installed.
- For Panorama Suite 2023 (23.00.004), ensure updates PS-2300-03-3078, PS-2300-04-3078, and PS-2300-82-3078 or higher are installed.
- For Panorama Suite 2025 (25.00.016), ensure updates PS-2500-02-1078 and PS-2500-04-1078 or higher are installed.
- For Panorama Suite 2025 Updated Dec. 25 (25.10.007), ensure updates PS-2510-02-1077 and PS-2510-04-1077 or higher are installed.
You can detect vulnerable systems by checking the installed Panorama Suite version and patch levels. Additionally, monitoring access logs for unusual read attempts to known sensitive Web HMI server file paths by the Servin process may help identify exploitation attempts.
Specific commands to detect this vulnerability are not provided in the available resources. It is recommended to consult the official security bulletin BS-035 on the Panorama CSIRT website for detailed detection and mitigation guidance.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability allows an attacker to gain read access to certain Web HMI server files if the attacker knows their paths and if these files are accessible to the Servin process execution account.
Such unauthorized access to server files could potentially lead to exposure of sensitive or personal data, which may impact compliance with data protection regulations such as GDPR or HIPAA.
However, the provided information does not explicitly describe the nature of the data exposed or the direct implications on compliance with these standards.