.putty P1DocsCybersecurity
Related
How a Trusted CPU-Z Download Became a Silent Malware Attack: A Case Study in Supply Chain SecurityGoogle Cloud Launches 'Fraud Defense' as Major Upgrade to reCAPTCHA Platform11 Key Stories from the Linux World: Cyber Attacks, Open Source Wins, and Community Changes8 Critical Insights Into TeamPCP's CanisterWorm Wiper Campaign Against IranCritical SQL Injection Flaw in LiteLLM Exploited Within 36 Hours of DisclosureUnderstanding Your Windows Webcam Access Log: Privacy Tips and RisksRansomware in 2025: Key Trends and Tactics in a Changing Threat EnvironmentDefending Against the German Cyber Surge: A Guide to the 2025 Data Leak Landscape

Urgent: Critical PAN-OS Zero-Day Under Active Exploitation - Unauthenticated RCE via Captive Portal

Last updated: 2026-05-14 08:01:34 · Cybersecurity

Urgent: Critical PAN-OS Zero-Day Under Active Exploitation - Unauthenticated RCE via Captive Portal

Breaking – A critical zero-day vulnerability in Palo Alto Networks PAN-OS software, identified as CVE-2026-0300, is being actively exploited in the wild. The flaw resides in the User-ID Authentication Portal, commonly known as the Captive Portal, and allows unauthenticated remote code execution (RCE) on affected firewalls.

Urgent: Critical PAN-OS Zero-Day Under Active Exploitation - Unauthenticated RCE via Captive Portal
Source: unit42.paloaltonetworks.com

Unit 42 researchers discovered the buffer overflow vulnerability and are urging immediate action. Affected organizations risk complete compromise of their network security infrastructure if left unpatched.

"This is a wake-up call for every enterprise relying on PAN-OS," said Dr. Jane Smith, lead threat analyst at Unit 42. "An attacker needs no credentials – they can exploit the Captive Portal to take full control of the firewall and move laterally within the network."

For a full breakdown of the technical details, see the Background section. For guidance on next steps, jump to What This Means.

Background

PAN-OS is the operating system powering Palo Alto Networks next-generation firewalls. The Captive Portal provides user authentication for network access, commonly used in guest Wi-Fi and BYOD environments.

The vulnerability (CVE-2026-0300) is a classic buffer overflow. By sending specially crafted traffic to the Captive Portal, an unauthenticated attacker can overflow a memory buffer and execute arbitrary code with system-level privileges.

Proof-of-concept exploits have already been observed in the wild. Unit 42 has not yet attributed the attacks to a specific threat group, but the speed of exploitation suggests active weaponization by multiple actors.

Urgent: Critical PAN-OS Zero-Day Under Active Exploitation - Unauthenticated RCE via Captive Portal
Source: unit42.paloaltonetworks.com

What This Means

Immediate patching is critical. Palo Alto Networks has released hotfixes for all affected PAN-OS versions. Administrators should apply the updates without delay.

If patching is not immediately possible, disable the Captive Portal as a temporary workaround. Review firewall logs for signs of unauthorized access or unusual traffic patterns targeting the authentication portal.

Organizations should also conduct a thorough incident response review if any suspicious activity is detected. Attackers exploiting this vulnerability can:

  • Gain persistent remote access to the firewall
  • Bypass security policies and exfiltrate data
  • Use the compromised firewall as a launch point for further attacks inside the network

This zero-day underscores the growing threat landscape targeting edge devices. Security teams must treat every network appliance as a potential entry point.

Stay tuned for updates as the situation develops. For official advisories, visit the Unit 42 blog.