CVE-2026-0300: PAN-OS Captive Portal Zero-Day Breakdown and Response Runbook

Kodem Security Research Team
May 8, 2026
May 8, 2026

0 min read

Vulnerabilities
CVE-2026-0300: PAN-OS Captive Portal Zero-Day Breakdown and Response Runbook

CVE-2026-0300, disclosed by Palo Alto Networks on May 5, 2026 and updated on May 7, 2026, is a critical severity (CVSS 9.3) PAN-OS zero-day in the User-ID Authentication Portal (Captive Portal) that lets unauthenticated attackers execute code as root on PA-Series and VM-Series firewalls. 

The Captive Portal flaw is a CWE-787 out-of-bounds write in the User-ID Authentication Portal request handling path. Palo Alto and Unit 42 have not published the exact request field, payload length or exploit structure as of this draft, so defenders should not rely on request-level signatures alone. Palo Alto confirmed exploitation in the wild at disclosure, with fixed versions shipping on a staggered May 13th and May 28th schedule. 

Until fixed versions are available for the affected PAN-OS branch, customers should restrict User-ID Authentication Portal access to trusted internal zones only or disable the Captive Portal where not required. For supported deployments, enable Threat ID 510019 as an additional detection and blocking control.

What Happened: Palo Alto Discloses CVE-2026-0300 in PAN-OS Captive Portal

CVE-2026-0300 is a critical severity (CVSS 9.3) buffer overflow in the PAN-OS User-ID Authentication Portal (Captive Portal) that allows unauthenticated remote code execution as root on PA-Series and VM-Series firewalls. Palo Alto Networks confirmed active in-the-wild exploitation before the full patch slate was available.

Disclosure Timing

Palo Alto reported limited exploitation at the time of disclosure, with full public proof-of-concept details not yet released and patch coverage staggered across the four affected branches PAN-OS 10.2, 11.1, 11.2, 12.1.

FieldValue
CVE IDCVE-2026-0300
CVSS Score9.3 (Critical)
Vulnerability ClassCWE-787 Out-of-Bounds Write (buffer overflow)
Affected ComponentPAN-OS User-ID Authentication Portal (Captive Portal)
Affected BranchesPAN-OS 10.2, 11.1, 11.2, 12.1
Affected Form FactorsPA-Series firewalls, VM-Series firewalls
Not AffectedCloud NGFW, Prisma Access
Attack VectorNetwork (remote, internet-reachable when Response Pages exposed)
Authentication RequiredNone
User InteractionNone
Privileges GainedRoot
Exploitation StatusConfirmed in the wild at disclosure
Patch ScheduleStaggered fixed versions shipping 05/13 and 05/28
Vendor DetectionThreat ID 510019 (PAN-OS 11.1 and later, Threat Prevention subscribers)

How CVE-2026-0300 Executes: From Crafted Packet to Root

Exploitation of CVE-2026-0300 requires a single specially crafted network request to the User-ID Authentication Portal, with no authentication and no user interaction (CVSS vector AV:N/AC:L/PR:N/UI:N). A successful trigger corrupts memory inside the Captive Portal request handler and yields arbitrary code execution at root on the firewall.

The Vulnerable Surface

The User-ID Authentication Portal (Captive Portal) is the PAN-OS service that intercepts unauthenticated HTTP and HTTPS sessions in a configured zone and redirects users to a login page before granting network access. Common deployment patterns (guest Wi-Fi onboarding, BYOD authentication, network access enforcement for unmanaged endpoints) push the portal toward the untrusted side of the firewall by design, because the portal must accept traffic from clients that have no prior authentication state.

That design intent is what makes CVE-2026-0300 reachable pre-authentication. Reachability is the conversion factor: a vulnerable PAN-OS branch alone is a memory-safety bug, but a vulnerable branch with Response Pages reachable from untrusted networks is a fleet-wide, internet-reachable, unauthenticated path to root. Every PA-Series and VM-Series firewall on an affected branch with a public-facing portal is one HTTP request away from compromise, regardless of how well downstream zones, the management plane, or the admin console are segmented.

The Buffer Overflow Mechanics

CVE-2026-0300 is a CWE-787 out-of-bounds write in the authentication request handling path of the User-ID Authentication Portal. The vulnerable code parses an attacker-controlled field on the inbound request and writes past the end of a fixed-size buffer, corrupting adjacent memory in the Captive Portal worker process.

Public proof-of-concept mechanics (the specific field, length, and payload structure that trigger the overflow) are not fully published as of May 2026. Palo Alto Networks and Unit 42 have confirmed the vulnerability class (CWE-787) and the privilege outcome (root). The exploitation primitives (whether the overflow drives a direct control-flow hijack or stages through heap corruption to reach code execution) remain a gap in the public record. Defenders should treat any reverse-engineered PoC posted to public repositories before the patch wave completes as weaponized and as a forcing function on the response timeline.

The architectural chain is short: an untrusted request reaches the portal, the parser writes attacker bytes outside the intended buffer, control transfers to attacker-supplied code, and execution continues under the privilege of the Captive Portal worker, which is root.

Privilege and Persistence Implications

Root on a PAN-OS firewall sits in the path of every authenticated session, every routed flow, and every credential that crosses the perimeter. In operational terms, successful exploitation of CVE-2026-0300 enables an attacker to:

  1. Intercept and modify traffic in flight, including TLS-terminated sessions where the firewall is the inspection point, plaintext authentication flows, and management protocol traffic crossing the device.
  2. Harvest credentials from User-ID mappings, GlobalProtect sessions, Captive Portal logins, and any cached authentication state held on the device.
  3. Modify firewall configuration to add administrator accounts, install SSH keys, weaken policy rules, disable threat detections (including Threat ID 510019), or open inbound paths into the interior network.
  4. Establish a persistent foothold through configuration-level changes that survive reboots and, when post-exploitation modifications are not detected during remediation, survive patch cycles.
  5. Pivot laterally uses the firewall's existing trust relationships with directory services, SIEM forwarders, syslog destinations, and management planes, none of which treat the firewall as a plausible source of malicious traffic.

The remediation consequence is direct: any PA-Series or VM-Series firewall that ran a vulnerable, externally reachable Captive Portal at any point between disclosure and patch cannot be cleared by upgrading PAN-OS alone. Configuration audit against a known-good baseline, rotation of every credential the device brokered, and integrity validation of administrator accounts and SSH keys are part of the response, not optional follow-ups.

Affected Versions and Exposure Conditions

CVE-2026-0300 affects PAN-OS 10.2, 11.1, 11.2, and 12.1 on PA-Series and VM-Series firewalls. Palo Alto also states that Prisma Access, Cloud NGFW and Panorama appliances are not impacted. Exposure requires both conditions: the User-ID Authentication Portal must be enabled, and Response Pages must be reachable from untrusted or internet-accessible interfaces.

Palo Alto Networks is shipping fixed PAN-OS versions in two staggered waves: May 13, 2026 and May 28, 2026. The matrix below maps every affected branch to its fixed version and patch ETA so a firewall fleet can be sequenced through patching against literal version strings.

BranchAffected VersionsFixed Version / ETA
PAN-OS 12.1< 12.1.4-h5>= 12.1.4-h5 (ETA: 05/13)
PAN-OS 12.1< 12.1.7>= 12.1.7 (ETA: 05/28)
PAN-OS 11.2< 11.2.4-h17>= 11.2.4-h17 (ETA: 05/28)
PAN-OS 11.2< 11.2.7-h13>= 11.2.7-h13 (ETA: 05/13)
PAN-OS 11.2< 11.2.10-h6>= 11.2.10-h6 (ETA: 05/13)
PAN-OS 11.2< 11.2.12>= 11.2.12 (ETA: 05/28)
PAN-OS 11.1< 11.1.4-h33>= 11.1.4-h33 (ETA: 05/13)
PAN-OS 11.1< 11.1.6-h32>= 11.1.6-h32 (ETA: 05/13)
PAN-OS 11.1< 11.1.7-h6>= 11.1.7-h6 (ETA: 05/28)
PAN-OS 11.1< 11.1.10-h25>= 11.1.10-h25 (ETA: 05/13)
PAN-OS 11.1< 11.1.13-h5>= 11.1.13-h5 (ETA: 05/13)
PAN-OS 11.1< 11.1.15>= 11.1.15 (ETA: 05/28)
PAN-OS 10.2< 10.2.7-h34>= 10.2.7-h34 (ETA: 05/28)
PAN-OS 10.2< 10.2.10-h36>= 10.2.10-h36 (ETA: 05/13)
PAN-OS 10.2< 10.2.13-h21>= 10.2.13-h21 (ETA: 05/28)
PAN-OS 10.2< 10.2.16-h7>= 10.2.16-h7 (ETA: 05/28)
PAN-OS 10.2< 10.2.18-h6>= 10.2.18-h6 (ETA: 05/13)

Exposure is two-part. A vulnerable version alone does not equal exploitable. The User-ID Authentication Portal (Captive Portal) must be enabled AND Response Pages must be reachable from untrusted networks. Many firewall fleets have one condition without the other. An affected PAN-OS branch with the Captive Portal disabled is not exploitable through CVE-2026-0300, and a fleet running the Captive Portal on a fully internal-only zone with no untrusted reachability is not remotely exploitable. This nuance matters for triage prioritization, because it is the difference between an emergency patch sweep and a sequenced, evidence-driven response.

Three checks per device determine exploitability:

  1. Is the running PAN-OS version on an affected branch PAN-OS 10.2, 11.1, 11.2, or 12.1 and below the fixed version for that branch?
  2. Is the User-ID Authentication Portal enabled in the device configuration?
  3. Are Response Pages reachable from any untrusted source zone the firewall touches, including the public internet, partner networks, or guest segments?

A firewall is exploitable through CVE-2026-0300 only when all three answers are yes. A "no" on any one of the three breaks the exploitation chain for this CVE, though the firewall still requires patching on the published Palo Alto schedule because configuration drift can flip a "no" to a "yes" at any time.

Immediate Response: The First-Hour Runbook

Triage CVE-2026-0300 in this order: confirm exposure, restrict access to the User-ID Authentication Portal, enable available threat detections, then patch when fixed versions ship for the affected PAN-OS branch. Do not assume unaffected status without verifying both configuration and network reachability.

  1. Inventory PAN-OS deployments: Identify all PA-Series and VM-Series firewalls running affected PAN-OS 10.2, 11.1, 11.2, or 12.1 versions.
  2. Confirm User-ID Authentication Portal status: Check whether the User-ID Authentication Portal is enabled on each affected firewall.
  3. Check Response Pages exposure: Review Interface Management Profiles and confirm whether Response Pages are enabled on external or internet-accessible interfaces.
  4. Restrict Captive Portal reachability: Limit User-ID Authentication Portal access to trusted internal IP addresses. Disable Response Pages on interfaces in zones where untrusted or internet traffic can ingress.
  5. Disable User-ID Authentication Portal where not required:Remove the vulnerable service from the exposed attack surface when Captive Portal is not actively needed.
  6. Enable Threat ID 510019 where supported:Palo Alto states that Threat ID 510019 requires Threat Prevention or Advanced Threat Prevention coverage, Applications and Threats content version 9097-10022, and PAN-OS 11.1 or later.
  7. Apply fixed PAN-OS versions as they ship: Patch according to the fixed-version matrix for the device’s branch and train.
  8. Review logs for 30 days before disclosure: Hunt for Captive Portal request anomalies, Threat ID 510019 detections, nginx crashes, new administrator accounts, SSH key changes, configuration drift, and firewall-originated outbound traffic.
  9. Validate firewall integrity: Review administrator accounts, SSH keys, authentication profiles, User-ID changes, Captive Portal settings, and management interface configuration against a known-good baseline.
  10. Hold non-security configuration changes: Pause planned firewall changes that are not security-critical until affected devices are patched and validated clean.

Indicators of Compromise (IOCs) and Behavioral Signals

As of May 7, 2026, defenders should hunt for exposed PAN-OS User-ID Authentication Portal services, Threat ID 510019 coverage gaps, anomalous nginx worker activity, post-exploitation tunneling tools, and firewall-originated outbound connections. Unit 42 has published concrete IOCs for CVE-2026-0300, including IP addresses, tool paths, an EarthWorm hash, download locations, and an attacker user agent string.

Configuration Indicators

IndicatorWhat to CheckWhy It Matters
Captive Portal enabledUser-ID Authentication Portal enabled on PA-Series or VM-Series firewallsCVE-2026-0300 requires the vulnerable Captive Portal surface to be active
Response Pages reachable from untrusted networksInterface Management Profile with Response Pages enabled on external or internet-accessible interfacesPalo Alto states exposure requires User-ID Authentication Portal enabled and Response Pages reachable from untrusted networks
Ports 6081 and 6082 exposedInternet-facing PAN-OS services on ports associated with User-ID Authentication Portal exposureWiz identifies ports 6081 and 6082 as primary exposure indicators for the vulnerable Authentication Portal surface
Threat ID 510019 coverage gapThreat Prevention or Advanced Threat Prevention subscription, Applications and Threats content version 9097-10022, and PAN-OS 11.1 or laterPalo Alto states Threat ID 510019 can block attacks when required content, subscription, and PAN-OS support are present
Missing allowlist controlsCaptive Portal reachable from arbitrary public IPs or non-allowlisted source rangesPalo Alto and Unit 42 identify the highest risk condition as User-ID Authentication Portal exposure to public internet or untrusted networks

Network Indicators

IndicatorWhat to CheckWhy It Matters
Inbound requests to User-ID Authentication PortalRequests from non-allowlisted or unexpected source IPsCVE-2026-0300 targets the PAN-OS User-ID Authentication Portal
Large or malformed authentication requestsAbnormal payload sizes or malformed requests to Captive Portal Response PagesCVE-2026-0300 is a buffer overflow in the authentication request handling path
Repeated malformed requestsRequest spikes, repeated failures, or abnormal request sequences against Captive PortalRepeated malformed traffic can indicate probing or exploit attempts
SAML flood activityHigh-volume SAML activity associated with User-ID or authentication workflowsUnit 42 observed a SAML flood before RCE was achieved on a second device
External source zones reaching Captive PortalTraffic from untrusted zones to Response PagesExploitable exposure requires the Captive Portal path to be reachable from untrusted networks

Published Unit 42 IOCs

IOCTypeNotes
67.206.213[.]86IP addressPublished by Unit 42
136.0.8[.]48IP addressPublished by Unit 42
146.70.100[.]69C2 staging IPUnit 42 identifies this as C2 staging
149.104.66[.]84IP addressPublished by Unit 42
hxxp[:]//146.70.100[.]69:8000/php_sessEarthWorm download locationPublished by Unit 42
hxxps[:]//github[.]com/Acebond/ReverseSocks5/releases/download/v2.2.0/ReverseSocks5-v2.2.0-linux-amd64.tar[.]gzReverseSocks5 download locationPublished by Unit 42
e11f69b49b6f2e829454371c31ebf86893f82a042dae3f2faf63dcd84f97a584EarthWorm hashPublished by Unit 42
Safari/532.31 Mozilla/5.5 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/138.0.0.0 Safari/537.36 Edg/138.0.0.0Attacker user agent stringPublished by Unit 42
/var/tmp/linuxapTunneling tool pathPublished by Unit 42
/var/tmp/linuxdaTunneling tool pathPublished by Unit 42
/var/tmp/linuxupdateTunneling tool pathPublished by Unit 42
/tmp/.cUnidentified Python scriptPublished by Unit 42
/tmp/R5ReverseSocks5 pathPublished by Unit 42
/var/R5ReverseSocks5 pathPublished by Unit 42

Process and Integrity Indicators

IndicatorWhat to CheckWhy It Matters
Shellcode in nginx worker processUnexpected code injection or abnormal execution inside an nginx worker processUnit 42 observed shellcode injection into an nginx worker after successful exploitation
PAN-OS process crashes or restartsCaptive Portal, User-ID, nginx, or related daemon instability around suspicious request activityMemory corruption attempts may produce instability before or during exploitation
Crash artifact cleanupCleared crash kernel messages, deleted nginx crash entries, deleted nginx crash records, or removed crash core dump filesUnit 42 observed log and crash evidence cleanup after successful exploitation
Deleted ptrace evidenceMissing or deleted ptrace injection evidence from audit logsUnit 42 observed deletion of ptrace injection evidence after AD enumeration
Deleted SUID privilege escalation binaryMissing or removed SUID binary associated with attacker activityUnit 42 observed deletion of a SUID privilege escalation binary
Unauthorized administrator changesNew administrator accounts, role changes, or authentication profile editsRoot access on the firewall can enable configuration modification
New or modified SSH keysUnexpected SSH key material on the PAN-OS applianceSSH key changes can indicate post-exploitation persistence
Configuration driftCaptive Portal, User-ID, admin, management interface, or authentication profile changes without a change ticketFirewall configuration changes can indicate attacker control after exploitation

Post-Exploitation Indicators

IndicatorWhat to CheckWhy It Matters
EarthWormPresence, download, execution, or outbound traffic associated with EarthWorm tunneling toolingUnit 42 observed EarthWorm deployment after exploitation
ReverseSocks5Presence, download, execution, or outbound traffic associated with ReverseSocks5 toolingUnit 42 observed ReverseSocks5 deployment after exploitation
Active Directory enumerationLDAP, Kerberos, DNS, or domain enumeration activity originating from the firewall or its service accountUnit 42 observed AD enumeration using credentials likely obtained from the firewall
Firewall service account credential useDomain activity from credentials associated with the firewallUnit 42 reported use of firewall service account credentials during AD enumeration
Domain root and DomainDnsZones targetingQueries or enumeration activity targeting domain root or DomainDnsZonesUnit 42 reported targeting of these AD objects during post-exploitation activity

Outbound Indicators

IndicatorWhat to CheckWhy It Matters
Firewall-originated outbound connectionsPAN-OS appliance initiating traffic to non-management destinationsA firewall reaching unexpected destinations is a high-confidence post-exploitation signal
Unexpected DNS lookups from PAN-OSDNS queries from the firewall outside update, logging, or approved management behaviorPost-exploitation tooling may resolve attacker-controlled infrastructure
Beaconing patternsPeriodic outbound connections from the firewall itselfPersistence or command-and-control activity may originate from the appliance
Connections to unknown management endpointsOutbound traffic not matching update servers, telemetry destinations, log collectors, or approved management systemsLegitimate firewall outbound traffic should be narrow and explainable

Log Review Targets

Log SourceSignal to Hunt
Captive Portal logsMalformed authentication requests, request spikes, external source IPs, unusual payload sizes
Threat Prevention logsThreat ID 510019 detections, missing content version 9097-10022, or missing coverage where the signature should be active
System logsCaptive Portal, User-ID, or nginx crashes, restarts, daemon anomalies, or unexpected service behavior
Configuration logsNew administrators, SSH key changes, authentication profile edits, User-ID changes, Captive Portal changes
Traffic logsFirewall-originated outbound traffic to non-management destinations
DNS logsUnexpected DNS lookups initiated by PAN-OS
Audit logsDeleted ptrace evidence, unexplained privilege activity, or signs of evidence cleanup

Why CVE Inventory Caught This but Exposure Mapping Mattered More

A traditional vulnerability inventory tool can answer the version question: does this firewall run an affected PAN-OS branch? CVE-2026-0300 risk depends on two additional exposure questions: was the User-ID Authentication Portal enabled, and were Captive Portal Response Pages reachable from untrusted networks?

For CVE-2026-0300, a vulnerable PAN-OS version is necessary, but not the full risk picture. Exploitable exposure requires the affected software, the enabled Captive Portal service, and a reachable path from untrusted networks.

Firewall fleets rarely share one configuration state. One PA-Series or VM-Series firewall may run an affected PAN-OS version with Captive Portal disabled. Another may run the same version with the User-ID Authentication Portal exposed to the internet. CVE inventory marks both as vulnerable. Exposure mapping separates immediate exploitation risk from lower-immediacy patch backlog.

The same gap appears in application security. Static inventory answers whether a vulnerable component exists. Runtime exposure answers whether the vulnerable service, function, package, or execution path is loaded, reachable, and active.

Kodem does not scan PAN-OS firewalls. The shared principle is broader: real risk depends on presence plus exposure. Runtime Intelligence applies that exposure-first logic to application code, dependencies, and runtime behavior by showing what is loaded, reachable, and executing in real environments.

ADR applies the same logic once exposure becomes activity. When a vulnerable path is exercised, runtime detection helps answer the next operational question: did exploitation actually execute?

CVE-2026-0300 reinforces the difference between vulnerability management and exploitability management. Inventory tells teams where to patch. Exposure mapping tells teams what to prioritize first.

Hardening Edge Authentication Surfaces Against the Next Variant

Edge authentication services across Ivanti, Citrix, Fortinet, Palo Alto, and other perimeter platforms remain recurring attacker targets because they sit at the edge and often broker privileged access. The CVE-2026-0300 hardening playbook is to reduce unauthenticated reachability, disable unused portal services, segment management paths, monitor appliance-originated traffic, and patch edge devices on a critical SLA.

  1. Default-deny inbound access to firewall management and authentication portals: Restrict Palo Alto Captive Portal, User-ID Authentication Portal, and management surfaces from untrusted networks. Allowlist trusted source IPs or place access behind a zero-trust proxy.
  2. Disable authentication portal services that are not in active use: Turn off Captive Portal and related authentication portal services where they are not required. Document which PA-Series and VM-Series deployments need them and audit that list quarterly.
  3. Segment management interfaces from public networks: Separate management access at the network and VLAN level, not only through firewall policy. Public internet reachability should not depend on a single rule remaining correct.
  4. Maintain vendor threat detection coverage: Subscribe to vendor threat detection content packs and verify automatic update cadence. For PAN-OS, confirm Threat ID 510019 coverage on supported PAN-OS 11.1 and later deployments with the required Threat Prevention or Advanced Threat Prevention content.
  5. Treat firewall fleet patching as a tiered SLA process: Critical CVEs on edge devices need a 72-hour SLA, not a quarterly maintenance window. Prioritize internet-facing Captive Portal deployments, then internal deployments reachable from untrusted zones.
  6. Monitor outbound traffic from firewall appliances: Alert when PAN-OS appliances initiate outbound connections to destinations outside approved update servers, telemetry endpoints, log collectors, and management systems. Firewall-originated traffic to unknown destinations is a high-confidence post-exploitation signal.
  7. Build and maintain an edge authentication exposure map: Track which firewalls, VPNs, and identity gateways expose authentication portals externally. For the next CVE-2026-0300-style disclosure, this list becomes the first-hour triage map.

What This Pattern Tells Us About Edge Appliance Security in 2026

CVE-2026-0300 is the latest entry in a multi-year pattern of attackers prioritizing edge security infrastructure, including VPNs, firewalls, and identity gateways, because compromise yields privileged interior access without alerting endpoint security stacks. Edge appliances now sit beside domain controllers and identity providers as first-tier targets.

  1. Edge security devices are now first-tier targets: Firewalls, VPNs, and authentication gateways broker access between untrusted networks and internal systems. Successful exploitation at this layer can give attackers a privileged foothold before endpoint controls observe activity.
  2. Memory-safety bugs in vendor C and C++ codebases continue to deliver pre-auth RCE: CVE-2026-0300 is a buffer overflow in the PAN-OS User-ID Authentication Portal. The mechanics differ from command injection flaws and file-write bugs seen in prior edge appliance CVEs, but the operational result is the same: unauthenticated code execution on a perimeter device.
  3. The disclosure-to-exploitation window keeps compressing: Palo Alto Networks confirmed active exploitation before the full patch slate was available. That timing moves response from routine patch management to exposure-driven incident response.

Frequently Asked Questions

CVE-2026-0300 is a critical PAN-OS User-ID Authentication Portal zero-day that can allow unauthenticated root RCE on affected PA-Series and VM-Series firewalls. Exploitable exposure depends on configuration: the Captive Portal must be enabled, and Response Pages must be reachable from untrusted networks.

  1. What is CVE-2026-0300?
    CVE-2026-0300 is a critical buffer overflow vulnerability in the PAN-OS User-ID Authentication Portal, also known as Captive Portal. The flaw allows unauthenticated attackers to execute arbitrary code with root privileges on affected PA-Series and VM-Series firewalls. Palo Alto rates the issue CVSS 9.3 and confirms active exploitation.
  2. Which PAN-OS versions are affected by CVE-2026-0300?
    Affected branches are PAN-OS 10.2, 11.1, 11.2, and 12.1 across PA-Series and VM-Series firewalls. Prisma Access, Cloud NGFW, and Panorama appliances are not impacted. 
  3. Is CVE-2026-0300 being actively exploited?
    Yes. Palo Alto Networks confirms limited in-the-wild exploitation targeting User-ID Authentication Portals exposed to untrusted IP addresses or the public internet. The risk is reduced when User-ID Authentication Portal access is restricted to trusted internal IP addresses.
  4. Do I need to patch if my Captive Portal is not internet-facing?
    Patching is still strongly recommended. Exploitation requires both conditions: User-ID Authentication Portal must be enabled, and an Interface Management Profile with Response Pages enabled must be associated with an external or internet-accessible interface. Immediate exposure is lower when both conditions are false, but teams should verify configuration and reachability directly.
  5. How do I detect CVE-2026-0300 exploitation attempts?
    Enable Threat ID 510019 where supported. Palo Alto states this control requires Threat Prevention or Advanced Threat Prevention coverage, Applications and Threats content version 9097-10022, and PAN-OS 11.1 or later. Review Captive Portal request logs, Threat Prevention logs, firewall-originated outbound traffic, administrator changes, SSH key changes, nginx process anomalies, and configuration drift.
  6. What credentials or data could attackers steal after exploiting CVE-2026-0300?
    Root access on a firewall can enable interception of authentication traffic, extraction of cached credentials, configuration modification, and persistence. Treat any compromised firewall as a credential-exposure incident across authentication flows brokered by the device.
  7. How does CVE-2026-0300 compare to past Palo Alto vulnerabilities like CVE-2024-3400?
    CVE-2026-0300 belongs to the same operational class of unauthenticated PAN-OS edge-RCE vulnerabilities, but the mechanics differ. CVE-2026-0300 is a buffer overflow in the User-ID Authentication Portal, while CVE-2024-3400 involves command injection. The shared lesson is that services exposed to untrusted networks are the real risk surface.
  8. Where can I track CVE-2026-0300 updates?
    Track the official Palo Alto Networks advisory, Unit 42 technical write-ups, Rapid7 emergent threat response updates and Wiz analysis. These sources should be checked again before publishing for updated fixed versions, Threat ID guidance, IOC strings, exploit request details, and log-field guidance.

References

  1. Kodem Security. May 14, 2025. Kodem’s Approach to ADR: Rethinking Application Detection & Response. Kodem Security.
  2. Palo Alto. May 6, 2026. CVE-2026-0300 PAN-OS: Unauthenticated user initiated Buffer Overflow Vulnerability in User-ID™ Authentication Portal. Palo Alto.
  3. Rapyd 7. May 7, 2026. Critical Buffer Overflow in Palo Alto Networks PAN-OS User-ID Authentication Portal (CVE-2026-0300). Rapyd 7.
  4. Unit 42. May 6, 2026. Threat Brief: Exploitation of PAN-OS Captive Portal Zero-Day for Unauthenticated Remote Code Execution. Unit 42.
  5. Wiz. May 6, 2026. Critical Buffer Overflow Vulnerability in PAN-OS Exploited in-the-Wild. Wiz.
Table of contents

Related blogs

CVE-2026-31431 (Copy Fail): Linux Kernel LPE Breakdown and Remediation Runbook

CVE-2026-31431, the Copy Fail Linux kernel LPE, lets authenticated users gain root. See affected kernels, exploit details, IOCs and patches.

May 5, 2026

12

Mini Shai-Hulud Strikes PyTorch Lightning and intercom-client: Inside the Cross-Ecosystem Supply Chain Attack

Mini Shai-Hulud compromised PyTorch Lightning (2.6.2, 2.6.3) and intercom-client (7.0.4). Affected versions, IOCs and response runbook.

May 1, 2026

9

shai-hulud worm sap packages thumbnail image

The Shai-Hulud Worm Returns: New npm Supply Chain Attack Compromises SAP Packages

The Shai-Hulud worm targets SAP npm packages via preinstall scripts. See affected packages, IOCs, and detection guidance for this supply chain attack.

April 30, 2026

8

Stop the waste.
Protect your environment with Kodem.

Get a personalized demo
Get a personalized demo

A Primer on Runtime Intelligence

See how Kodem's cutting-edge sensor technology revolutionizes application monitoring at the kernel level.

5.1k
Applications covered
1.1m
False positives eliminated
4.8k
Triage hours reduced

Platform Overview Video

Watch our short platform overview video to see how Kodem discovers real security risks in your code at runtime.

5.1k
Applications covered
1.1m
False positives eliminated
4.8k
Triage hours reduced

The State of the Application Security Workflow

This report aims to equip readers with actionable insights that can help future-proof their security programs. Kodem, the publisher of this report, purpose built a platform that bridges these gaps by unifying shift-left strategies with runtime monitoring and protection.

Get real-time insights across the full stack…code, containers, OS, and memory

Watch how Kodem’s runtime security platform detects and blocks attacks before they cause damage. No guesswork. Just precise, automated protection.

Combined author
Kodem Security Research Team
Publish date

0 min read

Vulnerabilities