<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>VM-Series Firewalls — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/vm-series-firewalls/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 07 May 2026 14:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/vm-series-firewalls/feed.xml" rel="self" type="application/rss+xml"/><item><title>PAN-OS Authentication Portal Remote Code Execution Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-panos-rce/</link><pubDate>Thu, 07 May 2026 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-panos-rce/</guid><description>An unauthenticated remote code execution vulnerability exists in the PAN-OS Authentication Portal (Captive Portal) service, potentially allowing attackers to execute arbitrary code with root privileges on PA-Series and VM-Series firewalls by sending crafted network packets.</description><content:encoded><![CDATA[<p>A critical vulnerability resides within the Authentication Portal, also known as Captive Portal, service of PAN-OS, the operating system for Palo Alto Networks next-generation firewalls. This flaw enables an unauthenticated remote attacker to execute arbitrary code with root privileges on affected firewalls. The vulnerability impacts PA-Series and VM-Series firewalls. Successful exploitation bypasses authentication and grants the attacker complete control over the firewall, potentially leading to network compromise, data exfiltration, or denial of service. Defenders must promptly apply the appropriate patches or mitigations to prevent exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable PAN-OS firewall with the Authentication Portal service enabled.</li>
<li>The attacker crafts a malicious network packet specifically designed to exploit the vulnerability in the Authentication Portal service.</li>
<li>The attacker sends the specially crafted packet to the targeted firewall on the port used by the Authentication Portal service (typically TCP port 443).</li>
<li>The vulnerable code within the Authentication Portal service fails to properly handle the malicious packet.</li>
<li>This leads to a buffer overflow or other memory corruption error.</li>
<li>The attacker leverages this memory corruption to inject and execute arbitrary code.</li>
<li>The injected code executes with root privileges due to the elevated permissions of the Authentication Portal service.</li>
<li>The attacker gains complete control over the firewall and can perform actions such as modifying firewall rules, accessing sensitive data, or pivoting to other internal networks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability grants an unauthenticated attacker complete control over the affected Palo Alto Networks firewalls. This can lead to a complete compromise of the network perimeter, allowing attackers to bypass security controls, exfiltrate sensitive data, or launch further attacks against internal systems. The root-level access obtained enables attackers to disable security features, modify configurations, and potentially use the compromised firewall as a persistent backdoor.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security patches released by Palo Alto Networks immediately to all affected PA-Series and VM-Series firewalls running PAN-OS to remediate the vulnerability.</li>
<li>Monitor network traffic for suspicious packets targeting the Authentication Portal service on PAN-OS firewalls, using a network intrusion detection system (NIDS).</li>
<li>Deploy the Sigma rule &ldquo;Detect PAN-OS Authentication Portal Exploitation Attempt&rdquo; to detect malicious packets attempting to exploit the vulnerability.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>vulnerability</category><category>rce</category><category>network</category></item></channel></rss>