Code Defence Cyber security

Palo Alto Networks releases emergency patches for PAN-OS root-level zero-day RCE

Official security updates have been released to address a critical root-level vulnerability in the perimeter security infrastructure of several thousand global organizations. This flaw has been under active exploitation by an advanced persistent threat actor since early April, facilitating unauthenticated remote code execution on the firewall.

Tracked as CVE-2026-0300, the vulnerability resides in the User-ID Authentication Portal component of PAN-OS. Attackers can trigger a buffer overflow by sending crafted network packets to the portal service, granting them root-level access to the appliance. While temporary mitigations involving service restriction were implemented last week, the availability of official patches from @[Palo Alto Networks](urn:li:organization:15502) now makes full remediation mandatory.

Because security appliances like the PA-Series firewalls often lack standard endpoint detection agents, they serve as ideal pivot points for long-term persistence. A compromise of the firewall allows an adversary to intercept unencrypted traffic and perform lateral movement into the internal network without triggering traditional workstation-based alerts.

– Apply the PAN-OS security updates immediately to all PA-Series and VM-Series firewalls to neutralize CVE-2026-0300.

– Verify that the User-ID Authentication Portal remains restricted to trusted internal IP ranges even after patching to maintain a least-privilege perimeter.

– Conduct a retroactive forensic audit of the firewall filesystem for unauthorized scripts or persistent web shells dating back to April 1.

– Rotate administrative credentials for the PAN-OS management interface to ensure no sessions were hijacked during the zero-day exposure window.

The availability of a patch for a perimeter zero-day requires immediate, fleet-wide action to close the adversary’s primary window of opportunity. #CodeDefence #PaloAltoNetworks #PANOS #ZeroDay #RCE
/

Scroll to Top