On May 6, 2026, Palo Alto Networks disclosed a critical zero-day vulnerability, CVE-2026-0300, in its PAN-OS software. The vulnerability is an unauthenticated buffer overflow in the User-ID™ Authentication Portal, also known as the Captive Portal. It has been assigned a CVSS score of 9.3 and allows for remote code execution (RCE) with root privileges. The company has confirmed active, albeit limited, exploitation of this flaw in the wild, primarily targeting internet-facing portals. Patches are currently unavailable, with fixes scheduled for release in waves starting mid-May 2026. Immediate mitigation by restricting network access to the User-ID Authentication Portal is strongly recommended for all affected customers.
The vulnerability, CVE-2026-0300, is a buffer overflow weakness within the User-ID Authentication Portal component of PAN-OS. This portal is used to authenticate users whose identity cannot be determined automatically by the firewall. An unauthenticated attacker on the network can exploit this flaw by sending a specially crafted packet to a vulnerable device. Successful exploitation results in the ability to execute arbitrary code with the highest possible privileges (root) on the firewall appliance.
The exploitability of this vulnerability is considered high, as it requires no authentication and can be triggered by a remote attacker. Palo Alto Networks notes that the exploit is automatable, increasing the risk of widespread attacks.
The attack vector is the User-ID Authentication Portal service. The risk is highest when this portal is exposed to the internet or other untrusted networks. The CVSS 9.3 rating reflects this worst-case scenario.
The vulnerability impacts multiple versions of PAN-OS software running on PA-Series (hardware) and VM-Series (virtual) firewalls. According to the advisory, the following versions are affected:
Products that are NOT affected include:
Palo Alto Networks has confirmed that CVE-2026-0300 is being actively exploited in the wild. The exploitation is described as "limited," suggesting targeted attacks rather than a widespread, indiscriminate campaign at this time. The primary targets observed are firewalls with the User-ID Authentication Portal exposed to the public internet. The Cybersecurity and Infrastructure Security Agency of Singapore (CSA) has also issued an alert, corroborating the active exploitation and urging organizations to take immediate action.
A successful exploit of CVE-2026-0300 grants an attacker full control over a compromised firewall. This has severe security implications:
Given that firewalls are critical security infrastructure, the business impact of a compromise is extremely high, potentially leading to major data breaches, operational downtime, and significant financial and reputational damage.
The following patterns may help identify vulnerable or compromised systems:
/auth/portal/authdsystem logsauthd process crashing or any unexpected behavior related to the User-ID service.Security teams should focus on identifying both vulnerable configurations and signs of active exploitation.
Identify Vulnerable Systems:
Device > User Identification > Authentication Portal Settings to determine if the portal is enabled and how it is configured. Check the access lists to see if it is exposed to untrusted networks.Detect Exploitation Attempts:
authd process. These events might be logged with details that point to a buffer overflow or memory corruption error.As patches are not yet available, mitigation is the only course of action.
Primary Mitigation (Recommended):
Secondary Mitigation:
Device > User Identification > Authentication Portal Settings.Patching (When Available):
Apply patches for PAN-OS as soon as they become available from Palo Alto Networks. This is the ultimate fix for the vulnerability.
Mapped D3FEND Techniques:
The primary mitigation. Restrict network access to the User-ID Authentication Portal to a limited set of trusted IP addresses and internal management zones.
Mapped D3FEND Techniques:
If the User-ID Authentication Portal is not required for business operations, disable it completely to eliminate the attack surface.
Mapped D3FEND Techniques:
Use network filtering rules on upstream devices or within the firewall itself to block all untrusted access to the management interface and associated portals.
Mapped D3FEND Techniques:
Implement strict inbound traffic filtering rules as the primary mitigation for CVE-2026-0300. This is not a generic recommendation; it is a critical, immediate action. Configure security policies on the Palo Alto Networks firewall itself, or on an upstream network device, to explicitly deny all traffic from the internet and other untrusted zones to the TCP port used by the User-ID Authentication Portal. The policy should be an 'allowlist' model, where only specific, pre-approved IP addresses or ranges from trusted internal management networks are permitted to connect. This directly addresses the attack vector by making the vulnerable service unreachable to external attackers. Regularly audit these rules to ensure they have not been inadvertently relaxed. This single action effectively neutralizes the threat of remote exploitation until a patch can be applied.
As a direct countermeasure to CVE-2026-0300, perform an immediate review and hardening of the PAN-OS configuration. If the User-ID Authentication Portal is not essential for your operations, disable it entirely. This is the most secure configuration, as it removes the vulnerable code from the attack surface. To do this, navigate to Device > User Identification > Authentication Portal Settings and uncheck the enable box. If the portal is required, verify that it is not bound to an external-facing interface. This hardening step goes beyond just filtering traffic and constitutes a fundamental reduction of the device's attack surface, preventing this and potentially future vulnerabilities in the same component from being exploitable.
While mitigations are critical, the definitive solution is patching. Organizations must establish a proactive plan to deploy the PAN-OS updates for CVE-2026-0300 immediately upon release. Given the 'automable' nature of the exploit, the window for safe operation will be short. Prioritize patching for internet-facing firewalls first, followed by other critical internal firewalls. The patching plan should include pre-deployment testing in a lab environment if possible, a rollback strategy, and post-deployment verification to ensure the update was successful and has not negatively impacted operations. Monitor Palo Alto Networks' security advisories closely for the exact release schedule for your specific PAN-OS version.
Palo Alto Networks publicly discloses CVE-2026-0300 and confirms active exploitation.
Projected date for the first wave of security patches from Palo Alto Networks.
Projected date for the second wave of security patches from Palo Alto Networks.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.