CVE-2026-0300: Palo Alto PAN-OS Root RCE Actively Exploited, Patches Arrive May 13
State-sponsored threat actors are actively exploiting CVE-2026-0300, a CVSS 9.3 buffer overflow in the Palo Alto Networks PAN-OS User-ID Authentication Portal. The vulnerability gives unauthenticated attackers root-level code execution on PA-Series and VM-Series firewalls, with no patch available until May 13, 2026.
CVE-2026-0300 is a buffer overflow in the User-ID Authentication Portal service, also known as the Captive Portal, built into PAN-OS. Attackers send specially crafted packets to the portal on network ports 6081 and 6082, triggering an out-of-bounds write condition that executes arbitrary code with root privileges on the target firewall. No authentication is required. No user interaction is needed. Palo Alto Networks' CVSS 4.0 assessment assigns CVE-2026-0300 its highest urgency rating of Red with an Exploit Status of Active.
Exploitation was confirmed on May 6, 2026. Palo Alto Networks updated its advisory on May 7 to attribute attacks to state-sponsored threat actors. CISA added CVE-2026-0300 to its Known Exploited Vulnerabilities catalog the same day. Shodan identifies 67 PAN-OS systems with ports 6081 or 6082 currently exposed to the public internet. Wiz research shows 7 percent of PAN-OS environments have a publicly reachable Authentication Portal. The first patches do not ship until May 13, leaving a five-day window in which configuration-level workarounds are the only available protection.
Any organization running a PA-Series or VM-Series firewall with the User-ID Authentication Portal enabled and reachable from an untrusted network faces direct risk of root-level compromise this weekend. Prisma Access, Cloud NGFW, and Panorama are not affected. This post covers the technical mechanism, affected versions, active exploitation evidence, and the specific steps to close this attack surface today.
Briefings like this, every morning before 9am.
Threat intel, active CVEs, and campaign alerts — distilled for practitioners. 50,000+ subscribers. No noise.
How Does CVE-2026-0300 Enable Unauthenticated Root Access?
CVE-2026-0300 exploits a buffer overflow in the User-ID Authentication Portal service in Palo Alto Networks PAN-OS. The portal processes HTTP packets to redirect unauthenticated users to a login page before granting network access. A logic flaw in how the service parses incoming network data allows an attacker to write beyond the intended memory buffer boundary, creating an out-of-bounds write condition that corrupts adjacent memory and redirects program execution to attacker-controlled code.
The exploit requires no prior authentication. The attack path is: send specially crafted packets to the Authentication Portal on the target firewall's network interface on port 6081 or 6082. The buffer overflow triggers during packet parsing before the service performs any credential check. Code execution achieves root privileges on the underlying PA-Series or VM-Series hardware because the portal service runs with elevated system permissions.
The attack is fully network-accessible from any untrusted location that can reach the portal interface. The CVSS 4.0 vector confirms this: AV:N (network-accessible), AC:L (low complexity), PR:N (no privileges required), UI:N (no user interaction). Palo Alto Networks' Threat Prevention signature Threat ID 510019, available in content update 9097-10022, blocks known exploitation attempts at the network level for PAN-OS 11.1 and later, but requires Threat Prevention to be active on the interface receiving untrusted traffic.
Two configuration conditions must both be true for a firewall to be exploitable. First, the User-ID Authentication Portal must be enabled in Device settings. Second, the Interface Management Profile attached to an internet-facing L3 interface must have Response Pages enabled. Disabling either condition removes the exploitable attack surface. This is why the configuration workarounds are immediately effective: they eliminate one or both prerequisites without requiring any software update.
Which PAN-OS Versions Are Affected by CVE-2026-0300?
CVE-2026-0300 affects PA-Series and VM-Series firewalls across four PAN-OS version branches: 10.2, 11.1, 11.2, and 12.1. Prisma Access, Cloud NGFW, and Panorama are explicitly not affected and require no action.
The patch timeline is split across two release dates. First-wave patches ship May 13, 2026, covering: 12.1.4-h5, 11.2.7-h13, 11.2.10-h6, 11.1.4-h33, 11.1.6-h32, 11.1.10-h25, 11.1.13-h5, 10.2.10-h36, and 10.2.18-h6. Organizations on these branches should schedule an immediate upgrade for May 13 as their primary remediation action.
Second-wave patches ship May 28, 2026, covering: 12.1.7, 11.2.4-h17, 11.2.12, 11.1.7-h6, 11.1.15, 10.2.7-h34, 10.2.13-h21, and 10.2.16-h7. Organizations on May 28 branches face a 20-day window with no software-level fix available. For those deployments, configuration workarounds are mandatory and must be applied before end of business today.
PAN-OS 10.1 and earlier are not listed in the advisory. Branches at or near end-of-life do not have guaranteed remediation coverage and Palo Alto Networks has not committed to backports for those versions. Organizations running end-of-life PAN-OS should treat their risk as unresolved, apply all available configuration mitigations immediately, and accelerate hardware refresh timelines.
To assess exposure across an entire estate, log into Panorama and use the device summary view to export all connected firewall PAN-OS versions. Cross-reference each version against the patch matrix in the official advisory at security.paloaltonetworks.com/CVE-2026-0300.
State-Sponsored Actors Actively Exploiting Exposed Palo Alto Firewalls
Palo Alto Networks confirmed limited in-the-wild exploitation of CVE-2026-0300 on May 6, 2026. Its updated advisory on May 7 states that attacks are "likely the work of state-sponsored threat actors." CISA added CVE-2026-0300 to the Known Exploited Vulnerabilities catalog following that attribution update, triggering a mandatory patching deadline for all federal civilian executive branch agencies under BOD 22-01.
The targeting pattern focuses on firewalls with Authentication Portals exposed to untrusted networks or the internet. Wiz telemetry shows 7 percent of PAN-OS environments have publicly reachable portal interfaces. Shodan identifies 67 systems currently exposing ports 6081 or 6082 to the internet. A narrow but high-value attack surface: root-level firewall compromise delivers complete network traffic visibility, the ability to intercept VPN credentials and session tokens, and a persistent foothold for lateral movement into internal network segments with no endpoint-level detection footprint.
This targeting pattern aligns with established state-sponsored tradecraft. [State-sponsored threat actors exploiting network appliances](/blog/unc5221-brickstorm-china-apt-legal-saas-espionage) have consistently targeted firewall-class devices because root access to a perimeter device delivers intelligence collection capabilities that remain invisible to EDR, SIEM endpoint alerts, and standard detection tooling. The compromise exists at the network infrastructure layer, not on monitored workstations or servers.
Palo Alto Networks has not named a specific threat cluster. Attribution to state-sponsored actors is based on the targeting scope — enterprises, critical infrastructure, and government networks — rather than the opportunistic mass scanning patterns typical of financially motivated cybercrime groups.
“Limited exploitation has been observed in production, with attacks likely the work of state-sponsored threat actors.”
Palo Alto Networks Security Advisory update, May 7, 2026
Subscribe to unlock Indicators of Compromise
Free subscribers unlock full IOC lists, remediation steps, and every daily briefing.
How to Find Vulnerable PAN-OS Authentication Portal Instances Now
Assess your exposure with three checks before taking remediation action.
First, determine whether the User-ID Authentication Portal is enabled. Log into the PAN-OS management interface, navigate to Device then User Identification, and check whether the Authentication Portal or Captive Portal is active in your configuration. If it is globally disabled, your attack surface for CVE-2026-0300 does not exist at the service level. If it is enabled, proceed to the zone check.
Second, confirm the portal zone is restricted to internal trusted zones. Navigate to Network then Zones and identify every zone containing interfaces that receive internet or untrusted traffic. If any such zone has Authentication Portal access, your firewall is exposed. Check your Interface Management Profiles under Network then Network Profiles then Interface Management Profile: if Response Pages is enabled on any L3 interface attached to an internet-facing zone, both exploitation prerequisites are met.
Third, validate external reachability. Search Shodan using the query `port:6081 org:"[your ASN]"` or `port:6082 org:"[your ASN]"`. Any results confirm that internet-facing scanners can reach your Authentication Portal right now. Wiz's attack surface module and similar external exposure tools flag port-6081 reachability on PAN-OS devices as a critical finding.
For Panorama-managed environments, use the Panorama API or management console to query all connected firewalls for their User-ID Authentication Portal configuration state in a single pass. This week's [CISA Known Exploited Vulnerabilities additions](/blog/cve-2026-31431-linux-copy-fail-weekly-brief) include CVE-2026-0300 alongside multiple other actively exploited flaws, reinforcing the importance of a comprehensive KEV sweep across your full asset inventory today.
How to Close the PAN-OS Firewall Attack Surface Before the Patch
The following steps eliminate the configuration conditions required for CVE-2026-0300 exploitation. Steps 1 through 3 require no software update and take effect immediately upon commit.
Subscribe to unlock Remediation & Mitigation steps
Free subscribers unlock full IOC lists, remediation steps, and every daily briefing.
Why Firewall Root Compromise Puts Your Entire Network at Risk
A root-level compromise of a perimeter firewall is categorically more damaging than most endpoint breaches. The firewall sits at the boundary of your network, processing all inbound and outbound traffic. An attacker with root access to that device gains capabilities no endpoint implant provides.
Traffic interception is the first-order risk. A threat actor with root access can capture all traffic transiting the firewall, including VPN authentication handshakes, credential exchanges, and unencrypted internal communications. Session tokens for web applications, SAML assertions, and Kerberos tickets flowing through the firewall become accessible to the attacker without any additional exploitation step.
Lateral movement from the firewall is the second-order risk. PA-Series and VM-Series firewalls authenticate to internal management systems, Active Directory, logging infrastructure, and SIEM platforms. Root access gives attackers the firewall's credentials and trust relationships, providing an authenticated entry point into internal network zones that would otherwise require significant additional effort to reach from an internet-facing position.
Long-term persistence is the third-order risk. Attackers with root access can install persistent backdoors in the firewall's operating system, establish command-and-control channels that masquerade as legitimate management traffic, and survive firewall configuration restores that do not involve a full OS re-imaging. This persistence pattern is consistent with prior state-sponsored campaigns against network appliances documented by CISA and multiple threat intelligence vendors.
The combination of network visibility, trusted internal access, and persistence capability makes a compromised perimeter firewall a high-priority incident response event even when post-compromise lateral movement has not yet been confirmed. Organizations that have not applied the CVE-2026-0300 workarounds should treat this as a same-day action item, not a scheduled maintenance window.
The bottom line
CVE-2026-0300 exposes Palo Alto PAN-OS firewalls to unauthenticated root-level code execution through the Authentication Portal, with state-sponsored actors actively exploiting 67 internet-exposed instances. No patch ships until May 13. Three actions to take before end of business today: restrict the Authentication Portal to trusted zones only, disable Response Pages on every internet-facing Interface Management Profile, and enable Threat ID 510019 if running PAN-OS 11.1 or later. Schedule your May 13 upgrade now.
Frequently asked questions
What is CVE-2026-0300 and why is it critical?
CVE-2026-0300 is a buffer overflow vulnerability in the User-ID Authentication Portal service of Palo Alto Networks PAN-OS. It carries a CVSS score of 9.3 and allows an unauthenticated attacker to execute arbitrary code with root privileges on PA-Series and VM-Series firewalls by sending specially crafted network packets. Palo Alto Networks rates it at their highest urgency level of Red with an Exploit Status of Active. CISA has added it to the Known Exploited Vulnerabilities catalog after confirming active exploitation attributed to state-sponsored threat actors.
Does CVE-2026-0300 require authentication to exploit?
No. CVE-2026-0300 requires no authentication, no special privileges, and no user interaction. The CVSS 4.0 vector confirms all three: PR:N (no privileges required), UI:N (no user interaction), AV:N (network accessible). An attacker needs only network access to the Authentication Portal interface. The absence of any authentication prerequisite is what elevates this to maximum urgency — any internet-reachable portal instance is immediately exploitable by any actor with network connectivity.
Which PAN-OS versions are affected by CVE-2026-0300?
CVE-2026-0300 affects PA-Series and VM-Series firewalls running PAN-OS 10.2, 11.1, 11.2, and 12.1 across multiple sub-versions. Prisma Access, Cloud NGFW, and Panorama are not affected. First-wave patches ship May 13, 2026 covering versions including 12.1.4-h5, 11.2.7-h13, 11.1.4-h33, and 10.2.10-h36. A second wave ships May 28. Log into the Palo Alto Networks support portal and cross-reference your registered device versions against the full patch matrix published in the official advisory.
Is Prisma Access or Cloud NGFW affected by CVE-2026-0300?
No. Palo Alto Networks explicitly states that Prisma Access, Cloud NGFW, and Panorama appliances are not impacted by CVE-2026-0300. The vulnerability is specific to the User-ID Authentication Portal service running on PA-Series and VM-Series firewalls. Organizations that have fully migrated to Prisma Access do not require any action for this CVE. However, verify that no legacy PA-Series or VM-Series firewalls remain anywhere in the environment before assuming full coverage.
What should I do right now before the May 13 patch ships?
Three configuration actions close the attack surface without requiring a software update. First, restrict the User-ID Authentication Portal to trusted internal zones and remove access from any zone receiving internet or untrusted traffic. Second, disable Response Pages in the Interface Management Profile on every L3 interface exposed to untrusted networks — this removes a required exploitation prerequisite. Third, if running PAN-OS 11.1 or later, enable Threat Prevention Threat ID 510019 using Applications and Threats content update 9097-10022 to block known exploitation attempts at the network level.
How do I detect if CVE-2026-0300 has been exploited on my firewall?
Review PAN-OS firewall logs for anomalous traffic on ports 6081 and 6082 starting May 6, 2026, the confirmed exploitation date. Look for unexpected HTTP request patterns to the Authentication Portal from external IP addresses, unusual process spawning from the portal service, and root-level configuration changes outside of change management windows. Use Panorama to aggregate logs across your firewall estate for correlated analysis. Check Cortex XSOAR or Autofocus dashboards for related IOC alerts if enrolled in Palo Alto Networks threat intelligence sharing.
Who is behind the attacks exploiting CVE-2026-0300?
Palo Alto Networks updated its advisory on May 7, 2026 to state that exploitation is likely the work of state-sponsored threat actors. No specific nation-state or named threat cluster has been publicly attributed as of May 8. The targeting pattern focuses on firewalls at enterprises, critical infrastructure, and government networks rather than opportunistic mass exploitation. CISA's mandatory patching directive under BOD 22-01 applies to all federal civilian executive branch agencies with an imminent remediation deadline.
When is the CVE-2026-0300 patch available and how do I apply it?
The first wave of CVE-2026-0300 patches ships May 13, 2026. Patched versions available on that date include 12.1.4-h5, 11.2.7-h13, 11.2.10-h6, 11.1.4-h33, 11.1.6-h32, 11.1.10-h25, 11.1.13-h5, 10.2.10-h36, and 10.2.18-h6. A second set ships May 28. To apply: log into the PAN-OS management interface, navigate to Device then Software, and download and install the update. For Panorama-managed deployments, use Panorama to push the update to all affected managed firewalls simultaneously from a single management operation.
Sources & references
- Palo Alto Networks Security Advisory — CVE-2026-0300
- CISA Known Exploited Vulnerabilities Catalog
- Wiz Blog — Critical Buffer Overflow Vulnerability in PAN-OS Exploited in the Wild
- Help Net Security — Root-level RCE vulnerability in Palo Alto firewalls exploited
- BleepingComputer — Palo Alto Networks warns of firewall RCE zero-day exploited in attacks
Free resources
Critical CVE Reference Card 2025–2026
25 actively exploited vulnerabilities with CVSS scores, exploit status, and patch availability. Print it, pin it, share it with your SOC team.
Ransomware Incident Response Playbook
Step-by-step 24-hour IR checklist covering detection, containment, eradication, and recovery. Built for SOC teams, IR leads, and CISOs.
Get threat intel before your inbox does.
50,000+ security professionals read Decryption Digest for early warnings on zero-days, ransomware, and nation-state campaigns. Free, weekly, no spam.
Unsubscribe anytime. We never sell your data.

Founder & Cybersecurity Evangelist, Decryption Digest
Cybersecurity professional with expertise in threat intelligence, vulnerability research, and enterprise security. Covers zero-days, ransomware, and nation-state operations for 50,000+ security professionals weekly.
