Open Nav
Sign Up

CVE-2026-0300: Actively Exploited Palo Alto PAN-OS Vulnerability Enables Root-Level RCE

cve-2026-0300

Filip Dimitrov

May 6, 2026

Palo Alto Networks has disclosed a critical PAN-OS vulnerability, tracked as CVE-2026-0300, affecting the User-ID Authentication Portal, also known as the Captive Portal. The flaw is a buffer overflow vulnerability that can allow an unauthenticated attacker to execute arbitrary code with root privileges on affected PA-Series and VM-Series firewalls.

Palo Alto has rated the vulnerability as Critical, with a CVSS 4.0 score of 9.3. Exploitation has already been observed in the wild, targeting User-ID Authentication Portals exposed to untrusted IP addresses or the public internet.

Technical Details

CVE-2026-0300 affects the User-ID Authentication Portal service in PAN-OS. By sending specially crafted packets to a vulnerable portal, an unauthenticated attacker may be able to trigger a buffer overflow and execute code on the firewall with root-level privileges.

The vulnerability only applies where the affected PAN-OS firewall is configured to use the User-ID Authentication Portal. Risk is significantly higher when the portal is reachable from the internet or other untrusted networks. Palo Alto notes that the severity is reduced where portal access is restricted to trusted internal IP addresses.

Affected Versions

The vulnerability affects PA-Series and VM-Series firewalls running vulnerable PAN-OS versions where the User-ID Authentication Portal is enabled.

Affected branches include:

PAN-OS BranchAffected Versions
PAN-OS 12.1Versions below 12.1.4-h5 and 12.1.7
PAN-OS 11.2Versions below 11.2.4-h17, 11.2.7-h13, 11.2.10-h6, and 11.2.12
PAN-OS 11.1Versions below 11.1.4-h33, 11.1.6-h32, 11.1.7-h6, 11.1.10-h25, 11.1.13-h5, and 11.1.15
PAN-OS 10.2Versions below 10.2.7-h34, 10.2.10-h36, 10.2.13-h21, 10.2.16-h7, and 10.2.18-h6

Palo Alto Networks states that Prisma Access, Cloud NGFW, and Panorama appliances are not impacted.

Impact

Successful exploitation could give an attacker root-level code execution on an affected firewall. This is a high-impact scenario because firewalls sit at critical network boundaries and often have visibility into, or control over, sensitive traffic flows.

A compromised firewall could potentially be abused for traffic inspection, policy manipulation, persistence, reconnaissance, or as a pivot point into internal environments. 

Recommended Actions

Organizations using Palo Alto PA-Series or VM-Series firewalls should immediately confirm whether the User-ID Authentication Portal / Captive Portal is enabled and whether it is externally accessible.

Administrators can review the relevant configuration under:

Device → User Identification → Authentication Portal Settings → Enable Authentication Portal

If the portal is enabled and reachable from the internet, access should be restricted immediately to trusted internal IP addresses and trusted zones only. If the portal is not required, it should be disabled until a fixed PAN-OS version is available and deployed.

Palo Alto Networks has stated that fixed versions are expected to begin releasing from 13 May 2026, with additional branch-specific fixes expected later in May. Until patches are available, exposure reduction is the primary mitigation.

Organizations should also review recent firewall activity for unusual inbound traffic, unexpected authentication activity, suspicious portal access, abnormal policy hits, configuration changes, or unexplained firewall service behavior.


Stay Safe. Stay Secure

OP Innovate Research Team

Under Cyber Attack?

Fill out the form and we will contact you immediately.