Palo Alto Networks Releases Security Advisory for Critical Vulnerability in PAN‑OS
CVE‑2026‑0300 enables unauthenticated remote code execution with root privileges on exposed Palo Alto PAN‑OS firewalls
Summary
CVE‑2026‑0300 enables unauthenticated remote code execution with root privileges on exposed Palo Alto PAN‑OS firewalls
Affected platforms
The following platforms are known to be affected:
Threat details
Exploitation of CVE-2026-0300
Palo Alto is aware of limited in‑the‑wild exploitation of CVE‑2026‑0300, targeting internet‑exposed User‑ID Authentication Portals.
The NHS England National CSOC assesses further exploitation as highly likely.
Introduction
Palo Alto Networks has released a security advisory to address a critical vulnerability in the User-ID™ Authentication Portal (aka Captive Portal) service of Palo Alto Networks PAN-OS software. Successful exploitation could allow a remote unauthenticated attacker to execute arbitrary code with root privileges on the PA-Series and VM-Series firewalls by sending specially crafted packets.
- CVE-2026-0300 - "Buffer overflow" vulnerability - CVSSv4 score: 9.3
Threat updates
| Date | Update |
|---|---|
| 14 May 2026 | First batch of updates released by Palo Alto |
Remediation advice
Affected organisations must review the Palo Alto Networks advisory CVE‑2026‑0300 PAN‑OS: Unauthenticated user initiated Buffer Overflow Vulnerability in User‑ID Authentication Portal and complete the remediation steps detailed below.
Remediation steps
| Type | Step |
|---|---|
| Action |
1. Required: Apply mitigations Affected organisations must disable the User-ID™ Authentication Portal if this service is not required. If disabling is not possible, organisations must restrict access to the User-ID™ Authentication Portal to only trusted zones. https://security.paloaltonetworks.com/CVE-2026-0300 |
| Patch |
2. Strongly encouraged: Apply patches Affected organisations are strongly encouraged to apply the patches for relevant versions when they are released. Note: Palo Alto Networks expects patches to be released on 13 May and 28 May. Please review Palo Alto Network's advisory for further details. A threat update will be issued when these patches become available. https://security.paloaltonetworks.com/CVE-2026-0300 |
Definitive source of threat updates
Last edited: 14 May 2026 2:26 pm