{"id":821,"date":"2026-05-06T07:53:36","date_gmt":"2026-05-06T07:53:36","guid":{"rendered":"https:\/\/thedigitalfortress.us\/?p=821"},"modified":"2026-05-06T07:53:36","modified_gmt":"2026-05-06T07:53:36","slug":"palo-alto-pan-os-flaw-under-active-exploitation-enables-remote-code-execution","status":"publish","type":"post","link":"https:\/\/thedigitalfortress.us\/?p=821","title":{"rendered":"Palo Alto PAN-OS Flaw Under Active Exploitation Enables Remote Code Execution"},"content":{"rendered":"<div>\n<p><span class=\"p-author\"><i class=\"icon-font icon-user\">\ue804<\/i><span class=\"author\">Ravie Lakshmanan<\/span><i class=\"icon-font icon-calendar\">\ue802<\/i><span class=\"author\">May 06, 2026<\/span><\/span><span class=\"p-tags\">Vulnerability \/ Network Security<\/span><\/p>\n<\/div>\n<div id=\"articlebody\">\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgF11tAg5Rdf8st9TeSlgPkW_Rn1I3Xi4Xl6wJjNMThFLB0oYYl2kKURYxYxgtnEphAJkeHzRxVrm8LX_7i8RDXgdLQhq4HM5ecZCrv3biRciuLM2JufgdxHqJR3eNTcTsIBWJBAz1Nv8Gac1fhW0vZ8Kgb7RFOC7_9zkL7Uy_SCrFOKps1scenY4c_LPSH\/s1700-e365\/paloalto.jpg\" style=\"clear: left; display: block; float: left;  text-align: center;\"><\/a><\/div>\n<p>Palo Alto Networks has released an advisory warning that a critical buffer overflow vulnerability in its PAN-OS software has been exploited in the wild.<\/p>\n<p>The vulnerability, tracked as <strong>CVE-2026-0300<\/strong>, has been described as a case of unauthenticated remote code execution. It carries a CVSS score of 9.3 if the User-ID Authentication Portal is configured to enable access from the internet or any untrusted network. The severity comes down to 8.7 if access to the portal is restricted to only trusted internal IP addresses.<\/p>\n<p>\u00abA buffer overflow vulnerability in the User-ID Authentication Portal (aka Captive Portal) service of Palo Alto Networks PAN-OS software allows an unauthenticated attacker to execute arbitrary code with root privileges on the PA-Series and VM-Series firewalls by sending specially crafted packets,\u00bb the company <a href=\"https:\/\/security.paloaltonetworks.com\/CVE-2026-0300\">said<\/a>.<\/p>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/threatlabz-vpn-risk-2026-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhnNON5UeWywT7OcPNw7V4L7QNWnCnm7Xl_99Y9ek8dL-gRwx-bWxQM1TKqt8deqqrdpUyKMuuijAWyyPQVB0s0qf8ntQ6ldFAJLru-QUWhddKTopc7SeNbBBnd-TsfFyRPP-AAyDuclLlL6XHK4_LXqDC_7eyaz9pzToYr7U543MhrJ7qcK-89sVWHTQUZ\/s728-e100\/zz-2-d.jpg\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>According to Palo Alto Networks, the vulnerability has come under \u00ablimited exploitation,\u00bb specifically targeting instances where the User-ID Authentication Portal has been left publicly accessible. The following versions are impacted by the flaw &#8211;<\/p>\n<ul>\n<li>PAN-OS 12.1 &#8211; &lt; 12.1.4-h5, &lt; 12.1.7<\/li>\n<li>PAN-OS 11.2 &#8211; &lt; 11.2.4-h17, &lt; 11.2.7-h13, &lt; 11.2.10-h6, &lt; 11.2.12<\/li>\n<li>PAN-OS 11.1 &#8211; &lt; 11.1.4-h33, &lt; 11.1.6-h32, &lt; 11.1.7-h6, &lt; 11.1.10-h25, &lt; 11.1.13-h5, &lt; 11.1.15<\/li>\n<li>PAN-OS 10.2 &#8211; &lt; 10.2.7-h34, &lt; 10.2.10-h36, &lt; 10.2.13-h21, &lt; 10.2.16-h7, &lt; 10.2.18-h6<\/li>\n<\/ul>\n<p>The issue, as it stands, is unpatched, with Palo Alto Networks planning to release fixes starting May 13, 2026. The company also said the vulnerability is applicable only to PA-Series and VM-Series firewalls that are configured to use the User-ID Authentication Portal.\u00a0<\/p>\n<p>\u00abCustomers following standard security best practices, such as restricting sensitive portals to trusted internal networks are at a greatly reduced risk,\u00bb it added.<\/p>\n<p>In the absence of a patch, users are advised to either <a href=\"https:\/\/live.paloaltonetworks.com\/t5\/general-articles\/why-it-s-essential-to-secure-your-management-interface\/ta-p\/1001286\">restrict User-ID Authentication Portal access<\/a> to only trusted zones, or disable it entirely, if it&#8217;s not required.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>\ue804Ravie Lakshmanan\ue802May 06, 2026Vulnerability \/ Network Security Palo Alto Networks has released an advisory warning that a critical buffer overflow vulnerability in its PAN-OS software has been exploited in the&hellip;<\/p>\n","protected":false},"author":1,"featured_media":822,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[64,1536,10,724,13,65,70,1535,1537,12],"class_list":["post-821","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-active","tag-alto","tag-code","tag-enables","tag-execution","tag-exploitation","tag-flaw","tag-palo","tag-panos","tag-remote"],"_links":{"self":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/821","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=821"}],"version-history":[{"count":0,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/821\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/media\/822"}],"wp:attachment":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=821"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=821"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=821"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}