Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Google Launches Android Spyware Forensics Tool for High-Risk Users

May 14, 2026

Palo Alto PAN-OS Flaw Under Active Exploitation Enables Remote Code Execution

May 14, 2026

Most Organizations Use AI Agents for Sensitive Security Tasks

May 14, 2026
Facebook X (Twitter) Instagram
Thursday, May 14
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Palo Alto PAN-OS Flaw Under Active Exploitation Enables Remote Code Execution
News

Palo Alto PAN-OS Flaw Under Active Exploitation Enables Remote Code Execution

Team-CWDBy Team-CWDMay 14, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Palo Alto Networks has released an advisory warning that a critical buffer overflow vulnerability in its PAN-OS software has been exploited in the wild.

The vulnerability, tracked as CVE-2026-0300, has been described as a case of unauthenticated remote code execution. It carries a CVSS score of 9.3 if the User-ID Authentication Portal is configured to enable access from the internet or any untrusted network. The severity comes down to 8.7 if access to the portal is restricted to only trusted internal IP addresses.

“A buffer overflow vulnerability in the User-ID Authentication Portal (aka Captive Portal) service of Palo Alto Networks PAN-OS software allows an unauthenticated attacker to execute arbitrary code with root privileges on the PA-Series and VM-Series firewalls by sending specially crafted packets,” the company said.

According to Palo Alto Networks, the vulnerability has come under “limited exploitation,” specifically targeting instances where the User-ID Authentication Portal has been left publicly accessible. The following versions are impacted by the flaw –

  • PAN-OS 12.1 – < 12.1.4-h5, < 12.1.7
  • PAN-OS 11.2 – < 11.2.4-h17, < 11.2.7-h13, < 11.2.10-h6, < 11.2.12
  • PAN-OS 11.1 – < 11.1.4-h33, < 11.1.6-h32, < 11.1.7-h6, < 11.1.10-h25, < 11.1.13-h5, < 11.1.15
  • PAN-OS 10.2 – < 10.2.7-h34, < 10.2.10-h36, < 10.2.13-h21, < 10.2.16-h7, < 10.2.18-h6

The issue, as it stands, is unpatched, with Palo Alto Networks planning to release fixes starting May 13, 2026. The company also said the vulnerability is applicable only to PA-Series and VM-Series firewalls that are configured to use the User-ID Authentication Portal. 

“Customers following standard security best practices, such as restricting sensitive portals to trusted internal networks are at a greatly reduced risk,” it added.

In the absence of a patch, users are advised to either restrict User-ID Authentication Portal access to only trusted zones, or disable it entirely, if it’s not required.

Update

The U.S. Cybersecurity and Infrastructure Security Agency (CISA), on May 6, 2026, added CVE-2026-0300 to its Known Exploited Vulnerabilities (KEV) catalog, requiring Federal Civilian Executive Branch (FCEB) agencies to apply the fixes or mitigations by May 9, 2026.

“This vulnerability is specific to a limited number of customers with their User-ID Authentication Portal (Captive Portal) exposed to the public internet or untrusted IP addresses,” a spokesperson for Palo Alto Networks told The Hacker News. “We have observed limited exploitation of this issue and are working to release software fixes, with the first updates expected to be available on May 13, 2026.”

“We have provided clear mitigation guidance to our customers to secure their environments immediately. This issue does not impact Cloud NGFW or Panorama appliances. We remain committed to a transparent, security-first approach to protect our global customer base.”

(The story was updated after publication to reflect the latest developments.)



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleMost Organizations Use AI Agents for Sensitive Security Tasks
Next Article Google Launches Android Spyware Forensics Tool for High-Risk Users
Team-CWD
  • Website

Related Posts

News

Google Launches Android Spyware Forensics Tool for High-Risk Users

May 14, 2026
News

Most Organizations Use AI Agents for Sensitive Security Tasks

May 14, 2026
News

Critical Apache HTTP/2 Flaw (CVE-2026-23918) Enables DoS and Potential RCE

May 14, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures

April 29, 202610 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Target Crypto Firms with ClickFix and Zoom Lures

April 29, 202610 Views
Our Picks

Fixing trivial passwords is as easy as 123456

May 7, 2026

How to tell if a voice call is AI or not

February 23, 2026

What it is and how to protect yourself

January 8, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.