Palo Alto PAN-OS Flaw Under Active Exploitation Enables Remote Code Execution
EXECUTIVE SUMMARY
Critical PAN-OS Vulnerability Exploited for Remote Code Execution
Summary
Palo Alto Networks has issued an advisory about a critical vulnerability in its PAN-OS software, which is being actively exploited. The flaw, identified as CVE-2026-0300, allows for unauthenticated remote code execution.
Key Points
- Vendor: Palo Alto Networks
- Product: PAN-OS
- Vulnerability: Buffer overflow leading to remote code execution
- CVE Number: CVE-2026-0300
- Severity: Critical, with a CVSS score of 9.3
- Exploitation: Active exploitation in the wild
- Configuration: Affected if User-ID Authentication Portal is internet-accessible
Analysis
The active exploitation of CVE-2026-0300 in PAN-OS represents a significant threat to organizations using this software. With a high CVSS score of 9.3, the vulnerability allows attackers to execute code remotely without authentication, posing severe risks to network security. Organizations with internet-accessible User-ID Authentication Portals are particularly vulnerable.
Conclusion
IT professionals should immediately review their PAN-OS configurations, especially the User-ID Authentication Portal settings. It is crucial to apply any available patches or mitigations provided by Palo Alto Networks to protect against potential exploits.