Tracked as CVE-2026-0300, the flaw affects the User-ID Authentication Portal (Captive Portal) and has already seen limited real-world exploitation, particularly in environments where the service is exposed to the internet.
The vulnerability stems from a buffer overflow issue (CWE-787) in the authentication portal component.
By sending specially crafted packets, attackers can exploit the flaw without authentication, potentially gaining full control over affected PA-Series and VM-Series firewalls. Given that these devices often sit at the network perimeter, successful exploitation could lead to complete network compromise.
Security researchers and Palo Alto Networks warn that the risk is highest when the User-ID Authentication Portal is accessible from untrusted networks or the public internet.
According to the advisory, organizations that follow best practices, such as restricting portal access to trusted internal IP addresses, face significantly lower risk.
The vulnerability impacts multiple PAN-OS versions, including 10.2, 11.1, 11.2, and 12.1 releases prior to specific patched builds. Notably, Prisma Access, Cloud NGFW, and Panorama appliances remain unaffected.
However, exploitation is only possible when certain configurations are in place:
This combination creates an externally reachable attack surface, allowing threat actors to trigger the buffer overflow remotely.
CVE-2026-0300 carries a CVSS score of 9.3 (Critical), reflecting its ease of exploitation and severe impact. Palo Alto confirms that limited exploitation attempts have already been observed in the wild, primarily targeting exposed authentication portals.
Even in cases where direct internet exposure is absent, attackers on adjacent networks may still exploit the flaw, lowering the attack complexity in lateral movement scenarios.
Palo Alto Networks has released patches across affected versions, with additional fixes scheduled for rollout by May 28, 2026. Organizations are strongly advised to upgrade immediately to fixed versions such as:
For environments where patching is delayed, Palo Alto recommends the following mitigations:
This vulnerability highlights a recurring issue in perimeter security appliances—misconfigured or exposed management and authentication services becoming high-value targets.
With attackers actively scanning for exposed portals, organizations must treat externally accessible firewall services as critical attack surfaces.
As exploitation activity continues to evolve, timely patching and strict access controls remain the most effective defenses against this high-impact flaw.
Follow us on Google News, LinkedIn, and X to Get More Instant Updates.
The post Palo Alto PAN-OS 0-Day Exploited to Execute Arbitrary Code With Root Privileges on Firewalls appeared first on Cyber Security News.
The Payments Association has appointed Emma Banymandhub as its next CEO. She replaces Ben Agnew,…
Food factory performance is dictated by a unique set of pressures. Even known variables, like…
Zoho Corporation has announced an investment of ₹70 crores (around US$7.3 million) in the Open…
For security reporting, CISOs have to provide their boards with information around risk. For many…
Sony and Marvel have today revealed just a little bit more of Spider-Man: Brand New…
Introducing Rock, Paper, Severed – a dark new horror game for 1-4 players that takes…
This website uses cookies.