<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>PAN-OS 10.2 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/pan-os-10.2/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 13 May 2026 16:08:13 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/pan-os-10.2/feed.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2026-0264 PAN-OS Heap-Based Buffer Overflow in DNS Proxy Allows RCE</title><link>https://feed.craftedsignal.io/briefs/2026-05-cve-2026-0264-panos-rce/</link><pubDate>Wed, 13 May 2026 16:08:13 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cve-2026-0264-panos-rce/</guid><description>CVE-2026-0264 is a heap-based buffer overflow vulnerability in Palo Alto Networks PAN-OS DNS proxy and DNS server features, allowing an unauthenticated attacker with network access to cause denial of service or potentially execute arbitrary code by sending crafted network traffic.</description><content:encoded><![CDATA[<p>A heap-based buffer overflow vulnerability, CVE-2026-0264, exists in the DNS proxy and DNS Server features of Palo Alto Networks PAN-OS software. An unauthenticated attacker with network access can exploit this vulnerability to cause a denial of service (DoS) condition on PAN-OS platforms (excluding Cloud NGFW and Prisma Access) or potentially achieve arbitrary code execution (ACE) on PA-Series hardware. The vulnerability affects PAN-OS versions 10.2, 11.1, 11.2, and 12.1. Specifically, it impacts devices where DNS Proxy is enabled with a network interface attached or when the DNS server configured on the NGFW uses a compromised public untrusted IP address. The risk is heightened when the interface is exposed to an untrusted network. Palo Alto Networks is not aware of any malicious exploitation of this issue at the time of disclosure.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable PAN-OS firewall with DNS Proxy enabled and exposed to an untrusted network.</li>
<li>The attacker crafts a malicious DNS query designed to trigger a heap-based buffer overflow.</li>
<li>The attacker sends the specially crafted DNS query to the vulnerable PAN-OS firewall.</li>
<li>The PAN-OS firewall&rsquo;s DNS proxy processes the malicious DNS query.</li>
<li>The buffer overflow occurs during the processing of the query in the DNS proxy or DNS server feature.</li>
<li>On PA-Series hardware firewalls, the overflow allows the attacker to overwrite memory and inject arbitrary code.</li>
<li>The injected code is executed, granting the attacker control over the firewall.</li>
<li>Alternatively, on VM-Series, the buffer overflow leads to a denial-of-service condition, disrupting the firewall&rsquo;s operation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-0264 can lead to a denial-of-service condition on vulnerable PAN-OS firewalls, impacting network availability and security. On PA-Series hardware firewalls, successful exploitation could allow an unauthenticated attacker to achieve arbitrary code execution, potentially leading to full system compromise and unauthorized access to sensitive data. The vendor is not aware of active exploitation as of the date of disclosure.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade PAN-OS to a fixed version as specified in the Palo Alto Networks advisory for CVE-2026-0264: 12.1.7, 12.1.4-h5, 11.2.12, 11.2.10-h6, 11.2.7-h13, 11.2.4-h17, 11.1.15, 11.1.13-h5, 11.1.10-h25, 11.1.7-h6, 11.1.6-h32, 11.1.4-h33, 10.2.18-h6, 10.2.16-h7, 10.2.13-h21, 10.2.10-h36, or 10.2.7-h34.</li>
<li>As a workaround, disassociate DNS Proxy from externally accessible interfaces or disable the DNS Proxy feature (Network &gt; DNS Proxy), and configure DNS server with a RFC1918 or a public trusted IP address.</li>
<li>Enable Threat ID 510027 with Applications and Threats content version 9100-10044 or later to block attacks targeting this vulnerability if you have a Threat Prevention subscription.</li>
<li>Monitor network traffic for suspicious DNS queries, particularly those with unusual length or structure, which may indicate exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>cve</category><category>heap-overflow</category><category>rce</category><category>dos</category><category>network</category></item><item><title>CVE-2026-0256 PAN-OS Stored Cross-Site Scripting (XSS) Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-cve-2026-0256-panos-xss/</link><pubDate>Wed, 13 May 2026 16:06:36 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cve-2026-0256-panos-xss/</guid><description>A stored cross-site scripting (XSS) vulnerability in Palo Alto Networks PAN-OS allows a malicious authenticated administrator to inject a JavaScript payload via the web interface, potentially impacting other administrators.</description><content:encoded><![CDATA[<p>CVE-2026-0256 is a stored cross-site scripting (XSS) vulnerability affecting Palo Alto Networks PAN-OS software. This vulnerability resides in the web interface and enables a malicious, authenticated administrator to inject and store a JavaScript payload. The injected payload can then be executed in the context of other administrators who interact with the affected part of the web interface. This issue impacts PAN-OS software on PA-Series and VM-Series firewalls and on Panorama (virtual and M-Series). Cloud NGFW and Prisma Access are not affected. Palo Alto Networks is not aware of any malicious exploitation of this issue.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains high-privileged administrative access to a vulnerable PAN-OS device.</li>
<li>The attacker crafts a malicious JavaScript payload.</li>
<li>The attacker authenticates to the PAN-OS web interface.</li>
<li>The attacker navigates to a vulnerable section of the web interface that allows storing data.</li>
<li>The attacker injects the crafted JavaScript payload into a field that is saved to the PAN-OS configuration.</li>
<li>Another administrator authenticates to the PAN-OS web interface.</li>
<li>The second administrator navigates to the section of the web interface where the malicious JavaScript payload is stored.</li>
<li>The stored JavaScript payload executes within the second administrator&rsquo;s browser session, potentially leading to session hijacking, credential theft, or other malicious actions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this stored XSS vulnerability (CVE-2026-0256) allows a malicious administrator to execute arbitrary JavaScript code within the browser of other administrators. This could lead to the compromise of administrative accounts, unauthorized configuration changes, or the exfiltration of sensitive information. While the vulnerability requires high privileges to inject the payload, the impact on other administrators could be significant.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade PAN-OS to a fixed version as specified in the Palo Alto Networks advisory to remediate CVE-2026-0256. Refer to the &ldquo;Solution&rdquo; section of the advisory for specific version recommendations.</li>
<li>Customers with a Threat Prevention subscription can enable Threat ID 510020 (from Applications and Threats content version 9100-10044 and later) to block attacks for this vulnerability, as mentioned in the &ldquo;Workarounds and Mitigations&rdquo; section.</li>
<li>Implement the mitigations described in the advisory, such as routing incoming traffic for the MGT port through a DP port, replacing the Certificate for Inbound Traffic Management, decrypting inbound traffic to the management interface, and enabling threat prevention on the inbound traffic to management services.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>xss</category><category>cve</category><category>web-interface</category></item></channel></rss>