Actively Exploited Zero-Day Flaw (CVE-2026-0300) in PAN-OS Allows Root Access on Palo Alto Networks Firewalls

CRITICAL: Palo Alto Networks Firewalls Under Active Attack via Unpatched Zero-Day (CVE-2026-0300)

CRITICAL
May 11, 2026
May 12, 2026
4m read
VulnerabilityCyberattackPatch Management

Related Entities(initial)

Organizations

Products & Tech

PAN-OS

CVE Identifiers

CVE-2026-0300
CRITICAL
CVSS:9.8

Full Report(when first published)

Executive Summary

Palo Alto Networks has issued an urgent security advisory for a critical zero-day vulnerability, CVE-2026-0300, in its PAN-OS firewall software. The vulnerability is a buffer overflow in the Captive Portal feature and is being actively exploited in the wild, reportedly by state-sponsored threat actors. A remote, unauthenticated attacker can exploit this flaw to achieve arbitrary code execution with root privileges on the firewall, effectively taking complete control of the device. The vulnerability has a CVSS score of 9.8 (Critical). Patches are not yet available, and customers are strongly advised to implement temporary mitigations immediately to protect their networks.

Vulnerability Details

  • CVE ID: CVE-2026-0300
  • CVSS Score: 9.8 (Critical)
  • Vulnerability Type: Buffer Overflow
  • Affected Component: User-ID Authentication Portal (Captive Portal)
  • Impact: Unauthenticated Remote Code Execution (RCE) with root privileges.

An attacker can send a specially crafted network packet to a vulnerable Captive Portal interface to trigger a buffer overflow. This overwrites adjacent memory with malicious code, which is then executed with the highest system privileges. No authentication or user interaction is required for a successful attack.

Affected Systems

The vulnerability affects the following Palo Alto Networks products running PAN-OS if the Captive Portal feature is enabled and accessible from an untrusted network (e.g., the internet):

  • PA-Series (physical) firewalls
  • VM-Series (virtual) firewalls

Products NOT affected include:

  • Prisma Access
  • Cloud NGFW
  • Panorama appliances

To be vulnerable, a device must have the Captive Portal enabled and have an interface with the portal service exposed to the attacker's network path.

Exploitation Status

This is a zero-day vulnerability that is being actively exploited. Palo Alto Networks has confirmed observing limited, targeted attacks against internet-exposed systems. The attackers are believed to be sophisticated, likely state-sponsored actors. The public disclosure of the vulnerability, even without a patch, will likely lead to reverse-engineering of the flaw and more widespread exploitation attempts by other groups.

Cyber Observables — Hunting Hints

The following patterns may help identify vulnerable or compromised systems:

Type
URL Pattern
Value
https://<firewall-ip-or-hostname>/php/login.php
Description
Default URL for the Captive Portal. Inbound requests to this URL from the internet are a primary indicator of exposure.
Type
Process Name
Value
authd
Description
The authentication daemon responsible for the Captive Portal. A crash or restart of this process could indicate an exploitation attempt.
Type
Log Source
Value
PAN-OS System Logs
Description
Look for logs related to the authd process restarting, or any core dump files being generated.
Type
Network Traffic Pattern
Value
Unusual traffic originating from the firewall's management or data plane interfaces
Description
A compromised firewall may be used as a pivot point. Monitor for unexpected outbound connections.

Detection Methods

  1. Threat ID Signatures: Palo Alto Networks has released Threat Prevention signatures (Threat IDs) to detect and block exploitation attempts. Customers with a valid Threat Prevention subscription should ensure their signatures are up-to-date. These signatures can detect the specific network packets used in the exploit.
  2. Check for Exposure: The most important detection step is to identify if you are vulnerable. Check your firewall configurations to see if Captive Portal is enabled and if the interface it is bound to is accessible from the internet. Any firewall with a Captive Portal on an external-facing interface should be considered at extreme risk.
  3. Log Monitoring: Monitor firewall system logs for any unusual activity, such as crashes of the authd process, unexpected reboots, or configuration changes.

Remediation Steps

As of May 11, 2026, patches are not yet available. They are scheduled for release on May 13 and May 28. In the interim, immediate mitigation is required.

CRITICAL MITIGATION:

The only way to mitigate this vulnerability is to prevent access to the Captive Portal from untrusted networks.

  • Apply Access Control Lists (ACLs): Configure security policies or ACLs on the firewall itself (or an upstream device) to strictly limit access to the Captive Portal interface. Access should only be permitted from a small set of trusted, internal IP addresses that are used for network administration.
  • Disable Captive Portal: If the User-ID Authentication Portal feature is not essential for your operations, disable it entirely. This is the most secure option.

Do NOT rely on Threat Prevention signatures alone. While helpful for detection, they are not a substitute for removing the exposure. A determined attacker may find a way to bypass the signatures.

Once patches are released, they should be applied on an emergency basis, prioritizing internet-facing firewalls.

Timeline of Events

1
May 11, 2026
Palo Alto Networks discloses the zero-day vulnerability CVE-2026-0300 and confirms active exploitation.
2
May 11, 2026
This article was published
3
May 13, 2026
First wave of patches is scheduled for release.
4
May 28, 2026
Second wave of patches is scheduled for release.

Article Updates

May 12, 2026

New details on CVE-2026-0300 impact, detection methods, and CERT-EU warning for the actively exploited Palo Alto Networks zero-day.

MITRE ATT&CK Mitigations

The primary mitigation is to use security policies (ACLs) to block access to the Captive Portal from the internet and other untrusted networks.

If the Captive Portal feature is not needed, disabling it entirely removes the attack surface.

Applying the forthcoming patches from Palo Alto Networks is the long-term solution to remediate the vulnerability.

Timeline of Events

1
May 11, 2026

Palo Alto Networks discloses the zero-day vulnerability CVE-2026-0300 and confirms active exploitation.

2
May 13, 2026

First wave of patches is scheduled for release.

3
May 28, 2026

Second wave of patches is scheduled for release.

Sources & References(when first published)

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Palo Alto NetworksPAN-OSZero-DayCVE-2026-0300RCEFirewallActive ExploitationCyberattack

📢 Share This Article

Help others stay informed about cybersecurity threats

🎯 MITRE ATT&CK Mapped

Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.

🧠 Enriched & Analyzed

Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.

🛡️ Actionable Guidance

Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.

🔗 STIX Visualizer

Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.

Sigma Generator

Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.