T
Threats
Palo Alto Networks PAN-OS Critical Authentication Portal Vulnerability

Overview
CVE: CVE-2026-0300
Severity: Critical
CVSS: 9.3
Advisory Date: 7 May 2026
A critical vulnerability in Palo Alto Networks PAN-OS User-ID Authentication Portal has been confirmed as actively exploited in limited real-world scenarios. The flaw enables unauthenticated remote code execution under certain configurations, particularly where the captive portal is exposed to untrusted networks. Organisations using affected firewall versions should assess exposure and ensure appropriate containment.
Affected Versions
PAN-OS 12.1: Versions below 12.1.4-h5 and 12.1.7
PAN-OS 11.2: Versions below 11.2.4-h17, 11.2.7-h13, 11.2.10-h6, and 11.2.12
PAN-OS 11.1: Versions below 11.1.4-h33, 11.1.6-h32, 11.1.7-h6, 11.1.10-h25, 11.1.13-h5, and 11.1.15
PAN-OS 10.2: Versions below 10.2.7-h34, 10.2.10-h36, 10.2.13-h21, 10.2.16-h7, and 10.2.18-h6
Vulnerability Breakdown
CVE-2026-0300 - Unauthenticated buffer overflow in User-ID Authentication Portal
Severity: Critical
CVSS: 9.3
Description: A buffer overflow vulnerability in the User-ID Authentication Portal service of PAN-OS allows an unauthenticated attacker to send specially crafted packets and execute arbitrary code.
Impact: Successful exploitation can result in arbitrary code execution with root privileges on affected PA-Series and VM-Series firewalls.
Conditions: The issue applies where User-ID Authentication Portal is enabled. Risk is highest when the portal is accessible from untrusted IP addresses or the public internet.
Notes: Palo Alto Networks has observed limited exploitation in the wild. A Threat Prevention Signature is available for customers running PAN-OS 11.1 and above.
Mitigation
Restrict User-ID Authentication Portal access to trusted internal IP addresses only.
Disable User-ID Authentication Portal if it is not required.
Apply the relevant fixed PAN-OS release for your branch as soon as possible.
Confirm Threat Prevention Signature coverage where PAN-OS 11.1 or above is in use.
Audit exposure under Device > User Identification > Authentication Portal Settings.
Summary for IT Teams
Products: Palo Alto Networks PAN-OS on PA-Series and VM-Series firewalls
Threat Level: Critical, CVSS 9.3
Action Required: Immediately identify any exposed Authentication Portals, restrict or disable access, and patch to the appropriate fixed PAN-OS release for your branch.
Reference
Need Help?
If you need assistance assessing exposure, restricting access, or validating PAN-OS mitigations, contact Secure ISS on 1300 769 460.
