Palo Alto PAN-OS Unauthenticated Root RCE via User-ID Authentication Portal
CVE-2026-0300 is a critical vulnerability in Palo Alto PAN-OS User-ID Authentication Portal that allows unauthenticated attackers to execute arbitrary code with root privileges on PA-Series and VM-Series firewalls configured to use the portal, with limited exploitation observed.
On May 6, 2026, Palo Alto Networks disclosed CVE-2026-0300, a critical vulnerability affecting PAN-OS. This vulnerability is a buffer overflow located in the User-ID Authentication Portal (Captive Portal) service. Successful exploitation allows an unauthenticated attacker to execute arbitrary code with root privileges on affected PA-Series and VM-Series firewalls. The vulnerability impacts firewalls configured to utilize the User-ID Authentication Portal feature. Palo Alto Networks has noted limited exploitation of this vulnerability. Immediate patching is advised upon release, alongside implementing provided workarounds.
Attack Chain
- The attacker identifies a vulnerable PA-Series or VM-Series firewall with the User-ID Authentication Portal enabled.
- The attacker crafts a malicious packet designed to exploit the buffer overflow in the User-ID Authentication Portal service.
- The attacker sends the specially crafted packet to the vulnerable firewall’s User-ID Authentication Portal endpoint.
- The buffer overflow occurs, allowing the attacker to overwrite memory and inject malicious code.
- The injected code executes with root privileges on the firewall.
- The attacker establishes persistence on the firewall, potentially through creating a new user account or modifying system configurations.
- The attacker uses their root access to move laterally within the network or exfiltrate sensitive data.
- The attacker achieves their objective, which could include data theft, disruption of services, or further exploitation of internal systems.
Impact
Successful exploitation of CVE-2026-0300 grants an unauthenticated attacker complete control over the affected Palo Alto Networks firewalls. This can lead to significant data breaches, disruption of network services, and the potential for lateral movement to other systems within the network. Given the role of firewalls in network security, a successful attack could compromise the entire protected network. Palo Alto Networks has reported limited exploitation, but the severity and ease of exploitation make this a high-priority vulnerability to address.
Recommendation
- Apply the security patches released by Palo Alto Networks as soon as they become available to remediate CVE-2026-0300.
- Restrict User-ID Authentication Portal access to only trusted zones as a mitigation measure described in the advisory.
- Disable the User-ID Authentication Portal if it is not required, as suggested in the advisory.
- Monitor network traffic for unusual patterns targeting the User-ID Authentication Portal using network connection logs.
- Deploy the Sigma rule “PAN-OS User-ID Authentication Portal Buffer Overflow Attempt” to detect potential exploitation attempts.
Detection coverage 2
PAN-OS User-ID Authentication Portal Buffer Overflow Attempt
highDetects potential attempts to exploit the buffer overflow vulnerability (CVE-2026-0300) in the PAN-OS User-ID Authentication Portal by monitoring for unusual traffic patterns.
PAN-OS Emergency Contact Email
highDetects connections to the PAN-OS Emergency contact email
Detection queries are kept inside the platform. Get full rules →
Indicators of compromise
1
| Type | Value |
|---|---|
| services@cert.europa.eu |