Description
A buffer overflow vulnerability in the User-ID™ Authentication Portal (aka Captive Portal) service of Palo Alto Networks PAN-OS software allows an unauthenticated attacker to execute arbitrary code with root privileges on the PA-Series and VM-Series firewalls by sending specially crafted packets. The risk of this issue is greatly reduced if you secure access to the User-ID™ Authentication Portal per the best practice guidelines https://knowledgebase.paloaltonetworks.com/KCSArticleDetail by restricting access to only trusted internal IP addresses. Prisma Access, Cloud NGFW and Panorama appliances are not impacted by this vulnerability.
The risk is highest when you configure the User-ID™ Authentication Portal to enable access from the Internet or any untrusted network.
You can greatly reduce the risk of exploitation by restricting User-ID™ Authentication Portal access to only trusted internal IP addresses and preventing its exposure to the internet.
CISA Known Exploited Vulnerability
Date added 2026-05-06 | Due date 2026-05-09
Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. Until the vendor releases an official fix, the following workaround should be implemented: - Restrict User-ID Authentication Portal access to only trusted zones. - Disable User-ID Authentication Portal if not required.
Problem types
Product status
All (custom)
12.1.0 (custom) before 12.1.7
11.2.0 (custom) before 11.2.12
11.1.0 (custom) before 11.1.15
10.2.0 (custom) before 10.2.18-h6
All (custom)
Timeline
| 2026-05-06: | Updated with Threat Prevention ID and clarified the Required Configuration section. |
| 2026-05-05: | Initial publication. |
References
www.cisa.gov/...nerabilities-catalog?field_cve=CVE-2026-0300
security.paloaltonetworks.com/CVE-2026-0300