[CIVN-2026-0226] Remote Code Execution Vulnerability in Palo Alto Networks PAN-OS

By Published On: May 9, 2026

—–BEGIN PGP SIGNED MESSAGE—–

Hash: SHA256


Remote Code Execution Vulnerability in Palo Alto Networks PAN-OS


Indian – Computer Emergency Response Team (https://www.cert-in.org.in)


Severity Rating: CRITICAL


Software Affected


PAN-OS 12.1 versions prior to 12.1.4-h5 and 12.1.7

PAN-OS 11.2 versions prior to 11.2.4-h17, 11.2.7-h13, 11.2.10-h6 and 11.2.12

PAN-OS 11.1 versions prior to 11.1.4-h33, 11.1.6-h32, 11.1.7-h6, 11.1.10-h25, 11.1.13-h5 and 11.1.15

PAN-OS 10.2 versions prior to 10.2.7-h34, 10.2.10-h36, 10.2.13-h21, 10.2.16-h7 and 10.2.18-h6

Overview


A critical vulnerability has been reported in Palo Alto Networks PAN-OS that may allow a unauthenticated remote attacker to execute arbitrary code with root privileges on the targeted system


Target Audience:

Organizations using PAN-OS based PA-Series and VM-Series firewalls.


Risk Assessment:

Critical risk of compromise of system integrity.


Impact Assessment:

Potential for complete system compromise.


Description


Palo Alto Networks PAN-OS is a network security operating system designed for PA-Series and VM-Series firewalls, providing enterprise-grade network security and threat prevention capabilities.


A vulnerability has been reported in the User-IDâ„¢ Authentication Portal (Captive Portal) service of Palo Alto Networks PAN-OS due to an out-of-bounds write condition leading to a buffer overflow. A remote attacker may exploit this vulnerability by sending specially crafted requests.


Successful exploitation of this vulnerability could allow an unauthenticated remote attacker to execute arbitrary code with root privileges on the targeted system.


Solution


Apply appropriate security updates as mentioned in:

https://security.paloaltonetworks.com/CVE-2026-0300



Vendor Information


Palo Alto

https://security.paloaltonetworks.com/


References


 

https://security.paloaltonetworks.com/CVE-2026-0300


CVE Name

CVE-2026-0300




– —


Thanks and Regards,

CERT-In


Incident Response Help Desk

e-mail: incident@cert-in.org.in

Phone: +91-11-22902657

Toll Free Number: 1800-11-4949

Toll Free Fax : 1800-11-6969

Web: http://www.cert-in.org.in

PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4

PGP Key information:

https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS


Postal address:

Indian Computer Emergency Response Team (CERT-In)

Ministry of Electronics and Information Technology

Government of India

Electronics Niketan

6, C.G.O. Complex

New Delhi-110 003

—–BEGIN PGP SIGNATURE—–


iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmn/MOYACgkQ3jCgcSdc

ys9eihAAo5DtSTokZo+7M+oxa5MxtAeTKv06gl+niMtyvAjErlX8jM0GdwEbWqy2

5Tqt7rxtRrVIjZEvCGpCN+NDmcUVctQqkIb4M09aq0qj+kXX2TNx+7GVSgDhfnaU

PFAyMB4G+1rhuQvFnsIUmuq87eYTqL6aSHU173KMHX53QTh69bGqRdXe8RDlpjVA

wMLj3UEA85vEmj4ccmzVek1GD1SftP03i/j8b7xvIIDhupe/DPKp6Da2lJZ1b4/4

RozZvZ7ScO4RwcAdoTwkRfj15pi2R3740EsQJmswiMVb/vBVz1jUvGErojdj+tWt

Ai5VZI58xqBr6PJVYD6kFJdV9uj1RZMUiRJ9o/TIQ9VzRZvdNDp+ym7w8ifOsREY

Sy42O+JnTEMz9xfShUaofjuUKTuHobW3kcftJpvTaPsv1TjpDvRElg3V7jgGY5Ii

NlAPRRsBIMuBYICg17A7beYPvMrH7yXiF0ICwBG5pAHuemcQTcUWGubL7L5f06ai

u6xHSzekpKD9/JckCfaBV83SU/aFvoJZCefBGaFGF0pV2ojn9D1G0EXWTYLfsYef

8uW6ZlisK7C8iprOqA76tAHDnLX/lxae0PI29hxvU4mVu8ZsE39qlJZONTVinEjU

B5Cfs/q0sTDI1EODt96pXi+BVaCozJR7HQeJfkQShMDbV6LVvF0=

=sJBd

—–END PGP SIGNATURE—–

Share this article