Particle.news
Download on the App Store

CISA Flags Exploited Palo Alto PAN-OS Zero-Day, Orders Rapid Fixes

Federal agencies face a May 9 deadline to lock down exposed authentication portals ahead of vendor patches starting May 13.

Overview

  • Palo Alto’s CVE-2026-0300 was added to CISA’s Known Exploited Vulnerabilities catalog Wednesday, and agencies were told to remediate by Saturday, May 9.
  • A buffer overflow in the User-ID Authentication Portal lets unauthenticated attackers run code as root on PA-Series and VM-Series firewalls, a flaw rated 9.3 in severity when the portal is internet-exposed.
  • Palo Alto said exploitation remains limited and targets portals reachable from the public internet or untrusted IPs, and it urged admins to restrict access or disable the feature until fixes land.
  • The company plans two patch waves, with initial PAN-OS updates due Wednesday, May 13, and a second round expected near May 28.
  • Palo Alto’s Unit 42 observed attempts beginning April 9 that led to a successful breach a week later, and Shadowserver now sees over 5,400 VM-Series devices exposed online, a level that could invite broader abuse.