Home

Description

A buffer overflow vulnerability in the User-ID™ Authentication Portal (aka Captive Portal) service of Palo Alto Networks PAN-OS software allows an unauthenticated attacker to execute arbitrary code with root privileges on the PA-Series and VM-Series firewalls by sending specially crafted packets. The risk of this issue is greatly reduced if you secure access to the User-ID™ Authentication Portal per the best practice guidelines https://knowledgebase.paloaltonetworks.com/KCSArticleDetail by restricting access to only trusted internal IP addresses. Prisma Access, Cloud NGFW and Panorama appliances are not impacted by this vulnerability.

PUBLISHED Reserved 2025-11-03 | Published 2026-05-06 | Updated 2026-05-06 | Assigner palo_alto




CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:N/E:A/AU:Y/R:U/V:C/RE:M/U:Red

The risk is highest when you configure the User-ID™ Authentication Portal to enable access from the Internet or any untrusted network.

HIGH: 8.7CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:N/E:A/AU:Y/R:U/V:C/RE:M/U:Red

You can greatly reduce the risk of exploitation by restricting User-ID™ Authentication Portal access to only trusted internal IP addresses and preventing its exposure to the internet.

CISA Known Exploited Vulnerability

Date added 2026-05-06 | Due date 2026-05-09

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. Until the vendor releases an official fix, the following workaround should be implemented: - Restrict User-ID Authentication Portal access to only trusted zones. - Disable User-ID Authentication Portal if not required.

Problem types

CWE-787: Out-of-bounds Write

Product status

Default status
unaffected

All (custom)
unaffected

Default status
unaffected

12.1.0 (custom) before 12.1.7
affected

11.2.0 (custom) before 11.2.12
affected

11.1.0 (custom) before 11.1.15
affected

10.2.0 (custom) before 10.2.18-h6
affected

Default status
unaffected

All (custom)
unaffected

Timeline

2026-05-06:Updated with Threat Prevention ID and clarified the Required Configuration section.
2026-05-05:Initial publication.

References

www.cisa.gov/...nerabilities-catalog?field_cve=CVE-2026-0300 government-resource

security.paloaltonetworks.com/CVE-2026-0300 vendor-advisory

cve.org (CVE-2026-0300)

nvd.nist.gov (CVE-2026-0300)

Download JSON