GBHackers

CISA Issues Warning Over Palo Alto PAN-OS Flaw Enabling Root-Level Access


The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent warning regarding a newly identified, severe vulnerability within Palo Alto Networks PAN-OS.

Officially tracked as CVE-2026-0300, this critical flaw was aggressively added to CISA’s Known Exploited Vulnerabilities (KEV) catalog on May 6, 2026.

Because the vulnerability grants unauthorized users complete system control, federal agencies and private organizations face an exceptionally tight remediation deadline of May 9, 2026, to secure their perimeter networks.

Palo Alto PAN-OS Flaw

The core issue involves a dangerous out-of-bounds write vulnerability in the PAN-OS User-ID Authentication Portal, commonly known as the Captive Portal service.

Categorized under CWE-787, an out-of-bounds write occurs when software writes data past the defined limits of its intended memory buffer.

You can think of this structural flaw like pouring too much water into a narrow glass; the excess water quickly overflows and ruins the sensitive documents sitting on the desk below.

In this digital scenario, attackers transmit specially crafted packets directly to the portal. This action causes targeted memory corruption, forcing the operating system to execute malicious instructions.

Since the vulnerability requires zero prior user authentication, threat actors can launch these attacks remotely across the internet without ever needing valid login credentials.

Security researchers have not yet confirmed if ransomware operators are actively exploiting this specific weakness. However, the extreme severity demands immediate administrative action.

At this time, Palo Alto Networks has not yet released an official software patch, making interim workarounds absolutely critical for network defense.

CISA strongly advises network administrators to immediately restrict network access to the User-ID Authentication Portal, ensuring it is accessible only from strictly trusted internal network zones.

If an organization does not actively require the Captive Portal feature for daily operations, the safest immediate action is to turn off the service entirely until a permanent firmware fix becomes available.

Furthermore, organizations utilizing cloud-hosted services must carefully follow the applicable vulnerability management guidance outlined in CISA’s Binding Operational Directive (BOD) 22-01.

Federal agencies are legally mandated to apply these specific mitigations by the strict May 9 deadline. We strongly encourage private sector companies and global enterprises to match this rapid timeline to prevent catastrophic data breaches and network compromises.

Follow us on Google News, LinkedIn, and X to Get Instant Updates and Set GBH as a Preferred Source in Google.



Source link