radar

ONE Sentinel

securitySecurity/THREATS/CRIT

Palo Alto PAN-OS Flaw Under Active Exploitation Enables Remote Code Execution

sourceThe Hacker News
calendar_todayMay 6, 2026
schedule1 min read
lightbulb

EXECUTIVE SUMMARY

Critical PAN-OS Vulnerability Exploited for Remote Code Execution

Summary

Palo Alto Networks has issued an advisory about a critical vulnerability in its PAN-OS software, which is being actively exploited. The flaw, identified as CVE-2026-0300, allows for unauthenticated remote code execution.

Key Points

  • Vendor: Palo Alto Networks
  • Product: PAN-OS
  • Vulnerability: Buffer overflow leading to remote code execution
  • CVE Number: CVE-2026-0300
  • Severity: Critical, with a CVSS score of 9.3
  • Exploitation: Active exploitation in the wild
  • Configuration: Affected if User-ID Authentication Portal is internet-accessible

Analysis

The active exploitation of CVE-2026-0300 in PAN-OS represents a significant threat to organizations using this software. With a high CVSS score of 9.3, the vulnerability allows attackers to execute code remotely without authentication, posing severe risks to network security. Organizations with internet-accessible User-ID Authentication Portals are particularly vulnerable.

Conclusion

IT professionals should immediately review their PAN-OS configurations, especially the User-ID Authentication Portal settings. It is crucial to apply any available patches or mitigations provided by Palo Alto Networks to protect against potential exploits.