Palo Alto Networks has issued an urgent security advisory for a critical zero-day vulnerability, CVE-2026-0300, in its PAN-OS firewall software. The vulnerability is a buffer overflow in the Captive Portal feature and is being actively exploited in the wild, reportedly by state-sponsored threat actors. A remote, unauthenticated attacker can exploit this flaw to achieve arbitrary code execution with root privileges on the firewall, effectively taking complete control of the device. The vulnerability has a CVSS score of 9.8 (Critical). Patches are not yet available, and customers are strongly advised to implement temporary mitigations immediately to protect their networks.
CVE-2026-0300An attacker can send a specially crafted network packet to a vulnerable Captive Portal interface to trigger a buffer overflow. This overwrites adjacent memory with malicious code, which is then executed with the highest system privileges. No authentication or user interaction is required for a successful attack.
The vulnerability affects the following Palo Alto Networks products running PAN-OS if the Captive Portal feature is enabled and accessible from an untrusted network (e.g., the internet):
Products NOT affected include:
To be vulnerable, a device must have the Captive Portal enabled and have an interface with the portal service exposed to the attacker's network path.
This is a zero-day vulnerability that is being actively exploited. Palo Alto Networks has confirmed observing limited, targeted attacks against internet-exposed systems. The attackers are believed to be sophisticated, likely state-sponsored actors. The public disclosure of the vulnerability, even without a patch, will likely lead to reverse-engineering of the flaw and more widespread exploitation attempts by other groups.
The following patterns may help identify vulnerable or compromised systems:
https://<firewall-ip-or-hostname>/php/login.phpauthdauthd process restarting, or any core dump files being generated.authd process, unexpected reboots, or configuration changes.As of May 11, 2026, patches are not yet available. They are scheduled for release on May 13 and May 28. In the interim, immediate mitigation is required.
CRITICAL MITIGATION:
The only way to mitigate this vulnerability is to prevent access to the Captive Portal from untrusted networks.
Do NOT rely on Threat Prevention signatures alone. While helpful for detection, they are not a substitute for removing the exposure. A determined attacker may find a way to bypass the signatures.
Once patches are released, they should be applied on an emergency basis, prioritizing internet-facing firewalls.
New details on CVE-2026-0300 impact, detection methods, and CERT-EU warning for the actively exploited Palo Alto Networks zero-day.
The primary mitigation is to use security policies (ACLs) to block access to the Captive Portal from the internet and other untrusted networks.
If the Captive Portal feature is not needed, disabling it entirely removes the attack surface.
Applying the forthcoming patches from Palo Alto Networks is the long-term solution to remediate the vulnerability.
Palo Alto Networks discloses the zero-day vulnerability CVE-2026-0300 and confirms active exploitation.
First wave of patches is scheduled for release.
Second wave of patches is scheduled for release.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.