Palo Alto Networks has confirmed the exploitation in real environments of a critical vulnerability in PAN-OS that allows remote execution of code without authentication on the user-ID Authentication Portal service (known as Captive Portal). Weakness, recorded as CVE-2026-0300, allows an attacker to send specially built packages to cause buffer overflow and to run root code privileges in PA-Series and VM-Series settings to use that portal.
The gravity of the failure is high: if the portal is accessible from the Internet or from unreliable networks the CVSS score is reached 9.3, while if your exposure is limited only to internal IP addresses and confidence low to 8.7. Palo Alto Networks describes the operation as "limited" so far, but the fact that the vector is a frequently exposed user interface implies a high risk for organizations that have not applied strict access controls.

The devices concerned include multiple branches of PAN-OS (versions 10.2, 11.1, 11.2 and 12.1) below certain patches; the exact list and the planned patch dates are available in the manufacturer's safety notice. Palo Alto has announced that it will release corrections from May 13, 2026, so in the meantime active mitigation is the first line of defense. For technical details and the CVE reference, see the national vulnerability database in https: / / nvd.nist.gov / vuln / detail / CVE-2026-0300 and the Palo Alto ad portal in https: / / security.paloaltonetworks.com /.
The practical implications go beyond a single local failure: a successful explosion opens the door to total firewall control, which can result in policy evasion, lateral movement within the network, exfiltration of data or installation of persistent back doors. In addition, the existence of public instances of authentication portals - often used for captive portals in Wi-Fi environments or for integrating user authentication - makes many organizations particularly attractive targets for attackers seeking to jump the perimeter defense.
While the official patch is expected, priority preventive measures are clear and should be implemented immediately. If the User-ID Authentication Portal is not necessary, disrespect. If necessary, limit its scope only to internal trusted IP areas and ranges through access control lists (ACL), administrative security rules and network segmentation; avoid exposing it to the Internet. Strengthen access controls to the firewall management plane and apply IP and VPN-based restrictions for any remote management access.

In addition, apply operational controls: review records and telemetry in search of unusual connections or malformed packages directed at the service of the portal, and immediately isolate any application that presents signs of commitment, change administrative credentials and, if appropriate, restore from clean known images. Integrate these actions into your incident response playbook and notify the Palo Alto support team to get assistance and patches as soon as they are available.
For security teams that manage large inventories or distributed environments, it is critical to quickly identify exposed instances: audit Internet-accessible gateway and portals, use authorized scanning and firewalls configuration reviews, and coordinate with managed service providers to confirm that there are no vulnerable endpoints. Maintaining a minimum exposure policy and routinely applying safety updates significantly reduces the risk window against such explosions.
Finally, remember that technical mitigation should be accompanied by communication and governance: report to internal stakeholders on risk, prioritize critical assets for the application of patches and document risk compensation decisions. The vulnerability CVE-2026-0300 stresses that even "user access" interfaces can become critical compromise vectors when exposed without adequate controls.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

Mini Shai-Hulud: the attack that turned the dependencies into mass intrusion vectors
Summary of the incident: GitHub investigates unauthorized access to internal repositories after the actor known as TeamPCP put the alleged source code and internal platform orga...

Fox Temper exposes the fragility of digital signature in the cloud
Microsoft's disclosure of the operation of "malware-signing-as-a-service" known as Fox Temper replaces in the center the most critical vulnerability of the modern software ecosy...

Trapdoor: the maldumping operation that turned Android apps into an automatic illicit income factory
Cybersecurity researchers have discovered an operation of maldumping and mobile advertising fraud named as Trapdoor, which turns legitimate Android application facilities into a...

From warning to orchestration and IA action to accelerate response to network incidents
IT and security teams live a well-known reality: a constant flood of alerts from monitoring platforms, infrastructure systems, identity services, ticketing tools and security so...

Nx Console in check: how a productivity extension became a credentials theft and a threat to the supply chain
An attack directed at developers again revealed the fragility of the software supply chain: the Nx Console extension for editors such as Visual Studio Code, with more than 2.2 m...