<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>PAN-OS 12.1 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/pan-os-12.1/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 13 May 2026 16:08:13 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/pan-os-12.1/feed.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2026-0264 PAN-OS Heap-Based Buffer Overflow in DNS Proxy Allows RCE</title><link>https://feed.craftedsignal.io/briefs/2026-05-cve-2026-0264-panos-rce/</link><pubDate>Wed, 13 May 2026 16:08:13 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cve-2026-0264-panos-rce/</guid><description>CVE-2026-0264 is a heap-based buffer overflow vulnerability in Palo Alto Networks PAN-OS DNS proxy and DNS server features, allowing an unauthenticated attacker with network access to cause denial of service or potentially execute arbitrary code by sending crafted network traffic.</description><content:encoded><![CDATA[<p>A heap-based buffer overflow vulnerability, CVE-2026-0264, exists in the DNS proxy and DNS Server features of Palo Alto Networks PAN-OS software. An unauthenticated attacker with network access can exploit this vulnerability to cause a denial of service (DoS) condition on PAN-OS platforms (excluding Cloud NGFW and Prisma Access) or potentially achieve arbitrary code execution (ACE) on PA-Series hardware. The vulnerability affects PAN-OS versions 10.2, 11.1, 11.2, and 12.1. Specifically, it impacts devices where DNS Proxy is enabled with a network interface attached or when the DNS server configured on the NGFW uses a compromised public untrusted IP address. The risk is heightened when the interface is exposed to an untrusted network. Palo Alto Networks is not aware of any malicious exploitation of this issue at the time of disclosure.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable PAN-OS firewall with DNS Proxy enabled and exposed to an untrusted network.</li>
<li>The attacker crafts a malicious DNS query designed to trigger a heap-based buffer overflow.</li>
<li>The attacker sends the specially crafted DNS query to the vulnerable PAN-OS firewall.</li>
<li>The PAN-OS firewall&rsquo;s DNS proxy processes the malicious DNS query.</li>
<li>The buffer overflow occurs during the processing of the query in the DNS proxy or DNS server feature.</li>
<li>On PA-Series hardware firewalls, the overflow allows the attacker to overwrite memory and inject arbitrary code.</li>
<li>The injected code is executed, granting the attacker control over the firewall.</li>
<li>Alternatively, on VM-Series, the buffer overflow leads to a denial-of-service condition, disrupting the firewall&rsquo;s operation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-0264 can lead to a denial-of-service condition on vulnerable PAN-OS firewalls, impacting network availability and security. On PA-Series hardware firewalls, successful exploitation could allow an unauthenticated attacker to achieve arbitrary code execution, potentially leading to full system compromise and unauthorized access to sensitive data. The vendor is not aware of active exploitation as of the date of disclosure.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade PAN-OS to a fixed version as specified in the Palo Alto Networks advisory for CVE-2026-0264: 12.1.7, 12.1.4-h5, 11.2.12, 11.2.10-h6, 11.2.7-h13, 11.2.4-h17, 11.1.15, 11.1.13-h5, 11.1.10-h25, 11.1.7-h6, 11.1.6-h32, 11.1.4-h33, 10.2.18-h6, 10.2.16-h7, 10.2.13-h21, 10.2.10-h36, or 10.2.7-h34.</li>
<li>As a workaround, disassociate DNS Proxy from externally accessible interfaces or disable the DNS Proxy feature (Network &gt; DNS Proxy), and configure DNS server with a RFC1918 or a public trusted IP address.</li>
<li>Enable Threat ID 510027 with Applications and Threats content version 9100-10044 or later to block attacks targeting this vulnerability if you have a Threat Prevention subscription.</li>
<li>Monitor network traffic for suspicious DNS queries, particularly those with unusual length or structure, which may indicate exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>cve</category><category>heap-overflow</category><category>rce</category><category>dos</category><category>network</category></item><item><title>CVE-2026-0263 PAN-OS: Remote Code Execution (RCE) in IKEv2 Processing</title><link>https://feed.craftedsignal.io/briefs/2026-05-cve-2026-0263-panos-rce/</link><pubDate>Wed, 13 May 2026 16:07:03 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cve-2026-0263-panos-rce/</guid><description>A buffer overflow vulnerability in Palo Alto Networks PAN-OS IKEv2 processing (CVE-2026-0263) allows unauthenticated network-based attackers to execute arbitrary code with elevated privileges or cause a denial of service, affecting versions 12.1, 11.2, and 11.1 when configured with Post Quantum Cryptography (PQC).</description><content:encoded><![CDATA[<p>CVE-2026-0263 is a buffer overflow vulnerability affecting Palo Alto Networks PAN-OS software. This vulnerability resides in the processing of IKEv2 when Post Quantum Cryptography (PQC) is enabled. An unauthenticated, network-based attacker can exploit this flaw to achieve remote code execution (RCE) with elevated privileges on the firewall or trigger a denial-of-service (DoS) condition. The vulnerability impacts PAN-OS versions 12.1 prior to 12.1.4-h5 and 12.1.7, 11.2 prior to 11.2.4-h17, 11.2.7-h13, 11.2.10-h6 and 11.2.12, and 11.1 prior to 11.1.4-h33, 11.1.6-h32, 11.1.7-h6, 11.1.10-h25, 11.1.13-h5 and 11.1.15. Exploitation requires the use of IKEv2 VPN tunnels configured with PQC. Panorama, Cloud NGFW, and Prisma Access are not affected by this vulnerability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker sends a crafted IKEv2 packet to a vulnerable PAN-OS firewall.</li>
<li>The firewall processes the malicious IKEv2 packet using the vulnerable IKEv2 processing module.</li>
<li>Due to the buffer overflow in the IKEv2 processing logic when PQC is enabled, the attacker&rsquo;s payload overwrites adjacent memory regions.</li>
<li>The overwritten memory contains critical system code or data.</li>
<li>The attacker gains control of the execution flow by overwriting a function pointer or return address.</li>
<li>The attacker injects and executes arbitrary code with elevated privileges on the firewall.</li>
<li>Alternatively, the attacker causes a denial-of-service (DoS) condition by corrupting system data, leading to a crash.</li>
<li>The attacker achieves remote code execution or causes a denial of service on the affected firewall.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-0263 allows an unauthenticated attacker to execute arbitrary code with elevated privileges on the firewall. This can lead to complete system compromise, including data exfiltration, modification of firewall policies, and disruption of network services. Alternatively, the attacker can cause a denial-of-service (DoS) condition, impacting network availability and business operations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade PAN-OS to the fixed versions: 12.1.4-h5 or later, 12.1.7 or later, 11.2.4-h17 or later, 11.2.7-h13 or later, 11.2.10-h6 or later, 11.2.12 or later, 11.1.4-h33 or later, 11.1.6-h32 or later, 11.1.7-h6 or later, 11.1.10-h25 or later, 11.1.13-h5 or later, 11.1.15 or later, as detailed in the Palo Alto Networks advisory for CVE-2026-0263.</li>
<li>If upgrading is not immediately possible, mitigate the vulnerability by configuring IKEv2 VPN tunnels only with NIST-approved Post Quantum Cryptography (PQC) ciphers, as mentioned in the advisory for CVE-2026-0263.</li>
<li>Monitor network traffic for anomalous IKEv2 packets, especially those with unusual sizes or structures, using network intrusion detection systems (NIDS).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>rce</category><category>dos</category><category>ikev2</category><category>palo-alto-networks</category><category>firewall</category></item><item><title>CVE-2026-0256 PAN-OS Stored Cross-Site Scripting (XSS) Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-cve-2026-0256-panos-xss/</link><pubDate>Wed, 13 May 2026 16:06:36 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cve-2026-0256-panos-xss/</guid><description>A stored cross-site scripting (XSS) vulnerability in Palo Alto Networks PAN-OS allows a malicious authenticated administrator to inject a JavaScript payload via the web interface, potentially impacting other administrators.</description><content:encoded><![CDATA[<p>CVE-2026-0256 is a stored cross-site scripting (XSS) vulnerability affecting Palo Alto Networks PAN-OS software. This vulnerability resides in the web interface and enables a malicious, authenticated administrator to inject and store a JavaScript payload. The injected payload can then be executed in the context of other administrators who interact with the affected part of the web interface. This issue impacts PAN-OS software on PA-Series and VM-Series firewalls and on Panorama (virtual and M-Series). Cloud NGFW and Prisma Access are not affected. Palo Alto Networks is not aware of any malicious exploitation of this issue.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains high-privileged administrative access to a vulnerable PAN-OS device.</li>
<li>The attacker crafts a malicious JavaScript payload.</li>
<li>The attacker authenticates to the PAN-OS web interface.</li>
<li>The attacker navigates to a vulnerable section of the web interface that allows storing data.</li>
<li>The attacker injects the crafted JavaScript payload into a field that is saved to the PAN-OS configuration.</li>
<li>Another administrator authenticates to the PAN-OS web interface.</li>
<li>The second administrator navigates to the section of the web interface where the malicious JavaScript payload is stored.</li>
<li>The stored JavaScript payload executes within the second administrator&rsquo;s browser session, potentially leading to session hijacking, credential theft, or other malicious actions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this stored XSS vulnerability (CVE-2026-0256) allows a malicious administrator to execute arbitrary JavaScript code within the browser of other administrators. This could lead to the compromise of administrative accounts, unauthorized configuration changes, or the exfiltration of sensitive information. While the vulnerability requires high privileges to inject the payload, the impact on other administrators could be significant.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade PAN-OS to a fixed version as specified in the Palo Alto Networks advisory to remediate CVE-2026-0256. Refer to the &ldquo;Solution&rdquo; section of the advisory for specific version recommendations.</li>
<li>Customers with a Threat Prevention subscription can enable Threat ID 510020 (from Applications and Threats content version 9100-10044 and later) to block attacks for this vulnerability, as mentioned in the &ldquo;Workarounds and Mitigations&rdquo; section.</li>
<li>Implement the mitigations described in the advisory, such as routing incoming traffic for the MGT port through a DP port, replacing the Certificate for Inbound Traffic Management, decrypting inbound traffic to the management interface, and enabling threat prevention on the inbound traffic to management services.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>xss</category><category>cve</category><category>web-interface</category></item></channel></rss>