Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

940+ Articles
122+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. PAN-OS RCE Exploit Under Active Use Enabling Root Access and Espionage
PAN-OS RCE Exploit Under Active Use Enabling Root Access and Espionage
NEWS

PAN-OS RCE Exploit Under Active Use Enabling Root Access and Espionage

Palo Alto Networks has disclosed that CVE-2026-0300, a critical CVSS 9.3 buffer overflow in the PAN-OS User-ID Authentication service, is being actively exploited to gain root-level remote code execution on network firewalls in what appear to be espionage-motivated campaigns.

Dylan H.

News Desk

May 10, 2026
5 min read

Palo Alto Networks has disclosed that threat actors began attempting to exploit CVE-2026-0300 as early as April 9, 2026 — weeks before the vulnerability was publicly disclosed. The flaw is a critical buffer overflow in the User-ID Authentication component of PAN-OS with a CVSS score of 9.3/8.7, and successful exploitation grants unauthenticated remote code execution with root-level privileges on affected firewall and network security appliances.

The vulnerability was reported by The Hacker News on May 7, 2026.

Vulnerability Details

FieldDetails
CVECVE-2026-0300
CVSS Score9.3 (Critical) / 8.7 (Temporal)
Vulnerability TypeBuffer Overflow
Affected ComponentUser-ID Authentication Service
ImpactUnauthenticated Remote Code Execution with Root Access
Exploitation StatusActively exploited; attempts observed from April 9, 2026
Affected ProductPalo Alto Networks PAN-OS

The buffer overflow vulnerability resides in the User-ID Authentication service, a component of PAN-OS responsible for correlating users to IP addresses and enforcing user-based security policies. The flaw allows a remote, unauthenticated attacker to overflow a memory buffer, overwrite adjacent memory regions, and ultimately execute arbitrary code at the operating system level — with root privileges.

Observed Exploitation and Espionage Context

Palo Alto Networks' Unit 42 threat intelligence team assessed that exploitation attempts observed from April 9 onward were unsuccessful in most cases, but the pattern and targeting profile are consistent with nation-state or espionage-motivated actors probing for access rather than opportunistic cybercriminals. Characteristics of the observed exploitation attempts include:

  • Targeted victim selection — attacks against specific high-value organizations rather than broad scanning
  • Low-and-slow reconnaissance — probing behavior consistent with threat actors seeking to avoid detection
  • Espionage-aligned targets — government agencies, critical infrastructure operators, and defense sector organizations

The use of firewall exploitation as an initial access vector is a hallmark of sophisticated state-sponsored campaigns, which seek persistent, stealthy footholds on the security perimeter devices that other defensive tools assume are trusted.

Why User-ID Authentication?

The User-ID Authentication service is an attractive target because:

  1. It is network-accessible — by design, it receives and processes identity data from various sources including Active Directory, LDAP, and client probing
  2. It runs with elevated privileges — as a core OS service, code execution within User-ID grants deep system access
  3. It is difficult to restrict — disabling User-ID breaks user-based policy enforcement, creating operational pressure against aggressive mitigation

Affected Versions and Patches

Palo Alto Networks has released patches for CVE-2026-0300. Organizations should consult Palo Alto's official security advisory for the specific PAN-OS versions affected and patched. The company has also published mitigations for organizations that cannot patch immediately.

Immediate Response Steps

Patch and Mitigate

  1. Apply the Palo Alto security patch for CVE-2026-0300 immediately — do not delay given active exploitation
  2. Implement available workarounds published by Palo Alto Networks if an immediate patch is not possible (e.g., disabling or restricting the User-ID Authentication service where operationally feasible)
  3. Restrict management access to PAN-OS devices using strict IP allowlisting and ensure management interfaces are not internet-facing

Detect and Hunt

  1. Review PAN-OS system logs for anomalous behavior beginning April 9, 2026 — the earliest confirmed exploitation attempt date
  2. Look for indicators of compromise published by Palo Alto Networks Unit 42 and third-party threat intelligence sources
  3. Check for unexpected processes or network connections originating from PAN-OS management interfaces
  4. Audit User-ID configurations for unauthorized changes to monitored domains, agents, or redistribution settings

Assess the Blast Radius

  1. Determine what an attacker with root on this firewall could access — routing tables, VPN credentials, traffic visibility, adjacent network segments
  2. Verify firewall HA pairs — in high-availability deployments, a compromised primary firewall may enable lateral movement to the secondary
  3. Review firewall administrator credentials and revoke/rotate any that may have been stored on the compromised device

Nation-State Targeting of Network Edge Devices

CVE-2026-0300 fits into a broader pattern of nation-state adversaries targeting network edge security products for initial access. This approach offers several advantages for espionage operators:

  • Persistence — security appliances are rebooted infrequently and may retain attacker implants for extended periods
  • Traffic visibility — a compromised firewall can passively intercept and exfiltrate traffic flowing through it
  • Trust exploitation — security devices are typically excluded from endpoint detection and response (EDR) coverage, making implants harder to detect
  • Lateral movement — firewalls have extensive network access that can be leveraged to reach other systems

Notable historical precedents include the exploitation of Fortinet, Ivanti Connect Secure, Cisco ASA, and Pulse Secure devices in major espionage campaigns attributed to Chinese, Russian, and Iranian state actors.

CISA and Regulatory Implications

Given the CVSS 9.3 score and confirmed active exploitation, CVE-2026-0300 is expected to be added to CISA's Known Exploited Vulnerabilities (KEV) catalog with an accelerated federal remediation deadline. Federal agencies running PAN-OS should prepare for an emergency directive.

Organizations subject to NIS2 (EU), DORA, or other cybersecurity regulatory frameworks should document their response actions and assess whether the vulnerability constitutes a reportable significant incident.

Recommendations for PAN-OS Operators

  • Treat this as a zero-day incident response — do not wait for a scheduled maintenance window
  • Inventory all PAN-OS deployments including versions and internet-facing exposure before patching
  • Engage Palo Alto support proactively if you observe indicators of compromise rather than attempting self-remediation
  • Review threat hunting resources from Palo Alto Networks Unit 42 for IOC lists and detection guidance

Bottom Line: A CVSS 9.3 RCE with root access in a widely-deployed firewall platform, with espionage-motivated exploitation underway since April — this warrants emergency treatment. Organizations running PAN-OS should patch immediately and hunt for indicators of compromise dating back to April 9, 2026.

#Vulnerability#CVE#Palo Alto Networks#PAN-OS#RCE#Espionage#Zero-Day#The Hacker News

Related Articles

Ivanti EPMM CVE-2026-6973 RCE Under Active Exploitation Grants Admin-Level Access

Ivanti has disclosed a high-severity improper input validation vulnerability in Endpoint Manager Mobile (EPMM) that is being actively exploited in the wild, granting attackers remote code execution with admin-level access.

5 min read

SGLang CVE-2026-5760 (CVSS 9.8) Enables RCE via Malicious GGUF Model Files

A critical CVSS 9.8 command injection vulnerability in the SGLang AI inference framework allows attackers to achieve remote code execution by supplying a...

4 min read

Adobe Reader Zero-Day Exploited via Malicious PDFs Since December 2025

Threat actors have been exploiting an unpatched zero-day in Adobe Reader since at least November 2025, using specially crafted PDFs to fingerprint victims...

5 min read
Back to all News