A critical buffer overflow vulnerability has been identified in Palo Alto Networks PAN-OS in the User-ID captive portal functionality that could lead to remote code execution. Tracked as CVE-2026-0300 and rated CVSS 9.3, the flaw stems from improper bounds handling that results in an out-of-bounds write when the service processes specially crafted network packets, potentially leading to remote code execution.
CVE-2026-0300 is a buffer overflow vulnerability in Palo Alto Networks PAN-OS. The flaw stems from improper bounds handling that results in an out-of-bounds write when the service processes specially crafted network packets. Exploitation requires no authentication, no user interaction, and only network reachability to the affected portal
Once access is obtained, attackers can:
This is a high-impact vulnerability due to PAN-OS’s central role as the security boundary in enterprise and government networks. A single compromise can cascade across all traffic, credentials, and internal systems the firewall is trusted to protect.ise can cascade across all managed domains and services.
A NodeZero Rapid Response test has been developed to safely validate whether this authentication bypass can be exploited in your environment. The test executes real attack techniques without causing damage, giving teams immediate clarity on exposure.
Affected
Affected PAN-OS versions on PA-Series and VM-Series firewalls prior to the patched releases are vulnerable when the User-ID Authentication Portal (Captive Portal) is enabled.
Patch
Patch Palo Alto Networks has released fixes across multiple PAN-OS branches. Upgrade to one of the following or later, matching the branch your firewall is on:
If patching cannot be performed immediately, restrict User-ID Authentication Portal access to trusted internal zones only, disable the portal where it is not required, and apply the Palo Alto Threat Prevention signature available for PAN-OS 11.1 and above.
The NodeZero® platform empowers your organization to reduce your security risks by autonomously finding exploitable weaknesses in your network, giving you detailed guidance around how to priortize and fix them, and having you immediately verify that your fixes are effective.