Skip to content
.ca
3 mincritical

Security Advisory 2026-006

Palo Alto Networks has disclosed a critical buffer overflow vulnerability (CVE-2026-0300, CVSS 9.3) in the PAN-OS User-ID Authentication Portal. This flaw allows unauthenticated remote attackers to execute arbitrary code with root privileges on affected PA-Series and VM-Series firewalls, with limited active exploitation already observed in the wild.

Sens:ImmediateConf:highAnalyzed:2026-05-06Google

Source:CERT-EU

Detection / HunterGoogle

What Happened

A critical security flaw has been discovered in Palo Alto Networks firewalls that use the User-ID Authentication Portal. This vulnerability allows attackers to take full control of the firewall without needing a username or password. Because the manufacturer has already seen attackers using this flaw, it is a severe risk to network security. While official software updates are not yet available, organizations should immediately restrict or disable the affected portal to protect their networks.

Key Takeaways

  • A critical buffer overflow vulnerability (CVE-2026-0300) exists in the PAN-OS User-ID Authentication Portal.
  • Unauthenticated attackers can exploit this flaw to execute arbitrary code with root privileges.
  • Limited in-the-wild exploitation has been observed by Palo Alto Networks.
  • Patches are currently unavailable; administrators must apply mitigations immediately.

Affected Systems

  • Palo Alto PA-Series firewalls configured with User-ID Authentication Portal
  • Palo Alto VM-Series firewalls configured with User-ID Authentication Portal
  • PAN-OS versions prior to 12.1.4-h5, 12.1.7, 11.2.4-h17, 11.2.7-h13, 11.2.10-h6, 11.2.12, 11.1.4-h33, 11.1.6-h32, 11.1.7-h6, 11.1.10-h25, 11.1.13-h5, 11.1.15, 10.2.7-h34, 10.2.10-h36, 10.2.13-h21, 10.2.16-h7, and 10.2.18-h6

Vulnerabilities (CVEs)

  • CVE-2026-0300

Attack Chain

An unauthenticated remote attacker targets the User-ID Authentication Portal (Captive Portal) service on a vulnerable Palo Alto PA-Series or VM-Series firewall. By sending specially crafted packets over the network, the attacker triggers a buffer overflow condition. This exploitation results in the execution of arbitrary code with root privileges directly on the firewall appliance.

Detection Availability

  • YARA Rules: No
  • Sigma Rules: No
  • Snort/Suricata Rules: No
  • KQL Queries: No
  • Splunk SPL Queries: No
  • EQL Queries: No
  • Other Detection Logic: No

No specific detection rules or queries are provided in the advisory.

Detection Engineering Assessment

EDR Visibility: None — EDR agents cannot typically be installed on proprietary network appliances like Palo Alto firewalls. Network Visibility: High — The exploit relies on specially crafted packets sent over the network to the Captive Portal, which could be detected by upstream IDS/IPS if signatures are developed. Detection Difficulty: Hard — Without specific payload details or packet signatures provided in the advisory, generically detecting the buffer overflow attempt on the portal is difficult.

Required Log Sources

  • Firewall System Logs
  • Network Flow Logs

Hunting Hypotheses

HypothesisTelemetryATT&CK StageFP Risk
Look for anomalous crashes, restarts, or error logs associated with the User-ID Authentication Portal service, which may indicate failed buffer overflow exploitation attempts.Firewall System LogsExecutionLow
Monitor for unexpected outbound network connections originating directly from the firewall's management or data plane interfaces to unknown external IP addresses.Network Flow LogsCommand and ControlMedium

Control Gaps

  • Lack of endpoint telemetry (EDR) on network appliances
  • Delayed patch availability from the vendor

Key Behavioral Indicators

  • Service crashes related to the Captive Portal
  • Unexpected root-level processes spawning on the firewall appliance

False Positive Assessment

  • Low

Recommendations

Immediate Mitigation

  • Restrict User-ID Authentication Portal access to only trusted zones.
  • Disable the User-ID Authentication Portal entirely if it is not required.

Infrastructure Hardening

  • Ensure management interfaces and authentication portals are not exposed to the public internet.

User Protection

  • N/A

Security Awareness

  • Monitor vendor channels closely for the release of official patches for CVE-2026-0300 and apply them immediately upon availability.

MITRE ATT&CK Mapping

  • T1190 - Exploit Public-Facing Application
  • T1068 - Exploitation for Privilege Escalation