A critical Palo Alto PAN-OS zero-day is being exploited in the wild
Attackers are actively exploiting a zero-day vulnerability affecting some Palo Alto Networksβ customersβ firewalls, the security vendor said in an advisory Tuesday.
The critical memory corruption vulnerability β CVE-2026-0300 β affects the authentication portal of PAN-OS, and allows unauthenticated attackers to runΒ code with root privileges on the vendorβs PA-Series and VM-Series firewalls, the company said.
Palo Alto Networks did not say when or how it became aware of active exploitation, nor when the earliest known exploitation occurred. The Cybersecurity and Infrastructure Security Agency added the defect to its known exploited vulnerabilities catalog Wednesday.
The company hasnβt released a patch for the vulnerability or described the scope and objective of confirmed attacks.
βThis vulnerability is specific to a limited number of customers with their User-ID Authentication Portal (Captive Portal) exposed to the public internet or untrusted IP addresses. We have observed limited exploitation of this issue and are working to release software fixes, with the first updates expected to be available on May 13,β a Palo Alto Networks spokesperson told CyberScoop.
The company said firewalls exposed to the buffer-overflow vulnerability, which has a CVSS rating of 9.3, are broadly exposed in real-world deployments, and it described the attack complexity as low.
Shadowserver scans found more than 5,800 publicly exposed VM-Series firewalls running PAN-OS as of Tuesday, yet itβs unknown how many of those instances have restricted authentication access to trusted internal IP addresses or disabled the feature altogether.
βWe have provided clear mitigation guidance to our customers to secure their environments immediately. This issue does not impact Cloud NGFW or Panorama appliances. We remain committed to a transparent, security-first approach to protect our global customer base,β Palo Alto Networksβ spokesperson added.
Benjamin Harris, CEO and founder of watchTowr, noted that Palo Alto Networks proactively alerted customers to the zero-day, a step that allowed defenders to take action on potentially exposed instances.Β
βIn a bad situation, that is the best they can do immediately. However, that also alerts everyone to the existence of a vulnerability,β he told CyberScoop.
Despite the risk, Harris said watchTowr expects attacks linked to the zero-day exploit to be βvery limited.βΒ
Palo Alto Networks and its impacted customers remain the only parties to have observed exploitation in the wild, but researchers warn that will likely change soon.Β
βItβs likely rules will also start to fire in third-party organizations and honeypots shortly,β Caitlin Condon, vice president of security research at VulnCheck, told CyberScoop.Β
βManagement interfaces, login pages, and authentication portals have been common adversary targets for both opportunistic and targeted campaigns in recent years,β she added. βWith researcher and community eyes on the vulnerability, itβs likely that weβll see public exploits and broader exploitation quickly, provided the issue isnβt prohibitively difficult to exploit.β
Palo Alto Networks has yet to attribute the attacks to any known threat group, publish indicators or compromise, nor disclose the type of organizations that have been targeted and impacted.Β
Researchers are hunting for malicious activity and advise customers to apply patches upon release.
The post A critical Palo Alto PAN-OS zero-day is being exploited in the wild appeared first on CyberScoop.