May 7 Advisory: Palo Alto PAN-OS User-ID Authentication Portal Buffer Overflow [CVE-2026-0300]

Rapid Response

Vulnerability Description

CVE-2026-0300 is an unauthenticated buffer overflow in the User-ID Authentication Portal (Captive Portal) service of PAN-OS. The vendor advisory states that exploitation yields arbitrary code execution with root privileges on PA-Series and VM-Series firewalls, and that risk is “greatly reduced” when access to the Authentication Portal is restricted to trusted internal IP addresses. Vendor-rated exploit maturity is “ATTACKED” with limited in-the-wild exploitation reported, primarily against Authentication Portals exposed to untrusted IP addresses or the public Internet. In observed campaigns, attackers have pivoted from the compromised firewall into the customer’s directory infrastructure, using firewall-extracted credentials to enumerate Active Directory.

Map of hosts exposed to CVE-2026-0300
Map of exposed hosts. See the full breakdown by country → 
FieldDescription
CVE-IDCVE-2026-4670 — CVSS v3 9.3 (critical) — assigned by Palo Alto Networks
Vulnerability DescriptionCVE-2026-0300 is an unauthenticated buffer overflow in the User-ID Authentication Portal (Captive Portal) service of PAN-OS. The vendor advisory states that exploitation yields arbitrary code execution with root privileges on PA-Series and VM-Series firewalls, and that risk is “greatly reduced” when access to the Authentication Portal is restricted to trusted internal IP addresses.
Date of DisclosureMay 6, 2026
Affected AssetsPalo Alto PA-Series and VM-Series firewalls running affected versions of PAN-OS (see below).

Note that Prisma Access, Cloud NGFW, and Panorama appliances are not impacted by this vulnerability. Exploitation requires the User-ID Authentication Portal feature to be enabled. Devices running affected versions with the Authentication Portal disabled are not exploitable but should still be updated.
Vulnerable Software VersionsPalo Alto PA-Series and VM-Series firewalls running the following versions of PAN-OS:

PAN-OS 12.1:
< 12.1.4-h5
< 12.1.7

PAN-OS 11.2:
< 11.2.4-h17
< 11.2.7-h13
< 11.2.10-h6
< 11.2.12

PAN-OS 11.1:
< 11.1.4-h33
< 11.1.6-h32
< 11.1.7-h6
< 11.1.10-h25
< 11.1.13-h5
< 11.1.15

PAN-OS 10.2:
< 10.2.7-h34
< 10.2.10-h36
< 10.2.13-h21
< 10.2.16-h7
< 10.2.18-h6
PoC AvailableNo third-party source we have reviewed publishes exploit code at the time of writing this.
Exploitation StatusCISA added CVE-2026-0300 to the KEV catalog with an FCEB remediation deadline, and several national CERTs have issued matching advisories. Per Palo Alto Unit 42, exploitation has been observed since April 9, 2026, with successful remote code execution achieved by April 16, 2026.

Observed post-exploitation activity includes shellcode injection into the nginx worker process on the firewall, Active Directory enumeration using credentials extracted from the firewall, anti-forensic log cleanup, and deployment of network tunneling tools (EarthWorm, ReverseSocks5) for outbound command and control.

Customers whose Authentication Portal was Internet-reachable during the pre-disclosure window should review the IOCs and artifact paths published by Unit 42 to assess whether their device may have been targeted.
Patch StatusPalo Alto Networks has published fixed-version targets across the 12.1, 11.2, 11.1, and 10.2 branches, and the advisory lists individual ETAs per version. Roughly half of the fixed builds are scheduled for May 13, 2026 and the remaining builds for May 28, 2026.

Until the fixed build for a given maintenance line is applied, the vendor’s published workarounds are to either restrict Authentication Portal access to trusted internal networks or disable the feature entirely if it is not required. Refer to the vendor advisory for the full configuration steps.

Censys ARC Perspective

Censys observes a global footprint of roughly 263,000 Internet-exposed hosts running PAN-OS. CVE-2026-0300 affects only PA and VM-Series firewalls, and only when the User-ID Authentication Portal feature is reachable from untrusted networks. Most Internet-exposed PAN-OS instances do not appear to publish the Authentication Portal externally, and the potentially vulnerable subset we can identify from scan data is much smaller than the overall PAN-OS population.

While exploitation is active and patches are still rolling out, we are not publishing the narrowing query for the exploitable subset. Customers should identify their PAN-OS exposure using the broad query below and verify Authentication Portal configuration directly on each device.

Platform

vendor: "PaloAltoNetworks" and product: "PAN-OS" and not labels="HONEYPOT"

ASM

((host.operating_system.vendor: "Palo Alto Networks" and host.operating_system.product: "PAN-OS") or host.services.software: (vendor: "Palo Alto Networks" and product: "PAN-OS") or web_entity.instances.software: (vendor: "Palo Alto Networks" and product: "PAN-OS"))

Legacy Search

((operating_system.vendor: "Palo Alto Networks" and operating_system.product: "PAN-OS") or services.software: (vendor: "Palo Alto Networks" and product: "PAN-OS")) and not labels: {"honeypot", "tarpit"}

References