{"id":16186,"date":"2026-05-07T11:16:19","date_gmt":"2026-05-07T11:16:19","guid":{"rendered":"https:\/\/newestek.com\/?p=16186"},"modified":"2026-05-07T11:16:19","modified_gmt":"2026-05-07T11:16:19","slug":"critical-palo-alto-networks-software-bug-hits-exposed-firewalls","status":"publish","type":"post","link":"https:\/\/newestek.com\/?p=16186","title":{"rendered":"Critical Palo Alto Networks software bug hits exposed firewalls"},"content":{"rendered":"<div>\n<div id=\"remove_no_follow\">\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<section class=\"wp-block-bigbite-multi-title\">\n<div class=\"container\"><\/div>\n<\/section>\n<p>Palo Alto Networks is warning customers about a critical buffer overflow vulnerability affecting its PAN-OS user-ID authentication portal that is already being exploited in the wild.<\/p>\n<p>The flaw allows attackers to execute arbitrary code with root privileges on exposed firewalls, the company said in a security <a href=\"https:\/\/security.paloaltonetworks.com\/CVE-2026-0300\" target=\"_blank\" rel=\"noreferrer noopener\">advisory<\/a>. PAN-OS is the software that runs all Palo Alto Networks next-generation firewalls.<\/p>\n<p>\u201cThis issue is applicable only to PA-Series and VM-Series firewalls that are configured to use User-ID Authentication Portal,\u201d the company added. \u201c<a href=\"https:\/\/www.csoonline.com\/article\/4148974\/palo-alto-updates-security-platform-to-discover-ai-agents.html\" target=\"_blank\">Prisma<\/a> Access, Cloud <a href=\"https:\/\/www.csoonline.com\/article\/4117730\/palo-alto-networks-patches-firewalls-after-discovery-of-a-new-denial-of-service-flaw-2.html\" target=\"_blank\">NGFW<\/a>, and Panorama appliances are not impacted by this vulnerability.\u201d<\/p>\n<p>The advisory noted that \u201climited exploitation\u201d was seen targeting authentication portals exposed to untrusted IP addresses and the public internet. Customers restricting these portals to trusted internal networks are safe.<\/p>\n<p>The issue is awaiting a fix in the upcoming releases of PAN-OS, and users were requested to apply workarounds and mitigations in the meantime.<\/p>\n<h2 class=\"wp-block-heading\"><a><\/a>Root access through a firewall login portal<\/h2>\n<p>The flaw, tracked as <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2026-0300\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2026-0300<\/a>, carries a CVSS score of 9.3 in internet-exposed deployments and has been classified as an out-of-bounds write vulnerability, mapped to CWE-787. According to Palo Alto Networks, the issue allows unauthenticated attackers to execute arbitrary code with root privileges on affected devices.<\/p>\n<p>The flaw only impacts PAN-OS deployments where User-ID Authentication Portal is enabled. Affected versions span multiple PAN-OS release branches, including 10.2,11.1, and 12.1 releases prior to patched builds scheduled for rollout in May.<\/p>\n<p>Wiz researcher <a href=\"https:\/\/www.linkedin.com\/in\/merav-bar-608351232\/\">Merav Bar<\/a> said the Google-owned research firm found a total 7% of environments having publicly exposed PAN-OS instances. However, how many of them have the affected portal enabled is not known. \u201cSince this portal utilizes ports 6081 and 6082, the exposure of these specific ports is the primary metric for exploitability,\u201d she added in a <a href=\"https:\/\/www.wiz.io\/blog\/critical-vulnerability-in-pan-os-exploited-in-the-wild-cve-2026-0300\" target=\"_blank\" rel=\"noreferrer noopener\">blog post<\/a>. \u201cCurrently, Shodan identifies 67 exposed PAN-OS servers on port 6081, with none detected on port 6082.\u201d<\/p>\n<p>The vulnerability has also attracted government attention. The US Cybersecurity and Infrastructure Security Agency (CISA) <a href=\"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-0300\" target=\"_blank\" rel=\"noreferrer noopener\">added<\/a> CVE-2026-0300 to its known Exploited Vulnerabilities (KEV) catalog shortly after the disclosure, while multiple national cybersecurity <a href=\"https:\/\/www.cyber.gc.ca\/en\/alerts-advisories\/palo-alto-networks-security-advisory-av26-425\" target=\"_blank\" rel=\"noreferrer noopener\">agencies<\/a> warned organizations to assume further exploitation is likely.<\/p>\n<h2 class=\"wp-block-heading\"><a><\/a>Mitigations first, patches shortly after<\/h2>\n<p>While Palo Alto Networks has announced fixes for affected PAN-OS branches, the company is urging customers to immediately reduce exposure rather than wait for patch windows. The vendor said the most important mitigation is restricting access to the User-Id Authentication Portal so it is reachable only from trusted internal IP addresses.<\/p>\n<p>Organizations that do not rely on the Captive Portal feature are being advised to disable it entirely. Palo Alto also recommended disabling Response Pages on interfaces exposed to untrusted traffic while keeping them enabled only on trusted internal interfaces where legitimate users connect.<\/p>\n<p>For customers with Threat Prevention subscriptions, Palo Alto said attacks can additionally be blocked using Threat ID 510019 included in Applications and Threats content version 9097-10022, though decoder support requires PAN-OS 11.1 or later.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Palo Alto Networks is warning customers about a critical buffer overflow vulnerability affecting its PAN-OS user-ID authentication portal that is already being exploited in the wild. The flaw allows attackers to execute arbitrary code with root privileges on exposed firewalls, the company said in a security advisory. PAN-OS is the software that runs all Palo Alto Networks next-generation firewalls. \u201cThis issue is applicable only to&#8230; <\/p>\n<p class=\"more\"><a class=\"more-link\" href=\"https:\/\/newestek.com\/?p=16186\">Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-16186","post","type-post","status-publish","format-standard","hentry","category-uncategorized","is-cat-link-borders-light is-cat-link-rounded"],"_links":{"self":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/16186","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=16186"}],"version-history":[{"count":0,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/16186\/revisions"}],"wp:attachment":[{"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=16186"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=16186"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=16186"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}