PAN-OS: Unauthenticated user initiated Buffer Overflow Vulnerability in User-ID™ Authentication Portal

Summary

CVECVE-2026-0300
StatePUBLISHED
Assignerpalo_alto
Source PriorityCVE Program / NVD first with legacy fallback
Published2026-05-06 19:16:35 UTC
Updated2026-05-07 17:46:44 UTC
DescriptionA buffer overflow vulnerability in the User-ID™ Authentication Portal (aka Captive Portal) service of Palo Alto Networks PAN-OS software allows an unauthenticated attacker to execute arbitrary code with root privileges on the PA-Series and VM-Series firewalls by sending specially crafted packets. The risk of this issue is greatly reduced if you secure access to the User-ID™ Authentication Portal per the best practice guidelines https://knowledgebase.paloaltonetworks.com/KCSArticleDetail by restricting access to only trusted internal IP addresses. Prisma Access, Cloud NGFW and Panorama appliances are not impacted by this vulnerability.

Risk And Classification

Primary CVSS: v4.0 9.3 CRITICAL from [email protected]

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:N/E:A/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:U/V:C/RE:M/U:Red

EPSS: 0.148970000 probability, percentile 0.945690000 (date 2026-05-07)

CISA KEV: Listed on 2026-05-06; due 2026-05-09; ransomware use Unknown

Problem Types: CWE-787 | CWE-787 CWE-787: Out-of-bounds Write


VersionSourceTypeScoreSeverityVector
4.0[email protected]Secondary9.3CRITICALCVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:N/E:A/C...
4.0CNACVSS9.3CRITICALCVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:N/E:A/A...
4.0CNACVSS8.7HIGHCVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:N/E:A/A...
3.1[email protected]Primary9.8CRITICALCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0 Breakdown

Attack Vector
Network
Attack Complexity
Low
Attack Requirements
None
Privileges Required
None
User Interaction
None
Confidentiality
High
Integrity
High
Availability
High
Sub Conf.
Low
Sub Integrity
Low
Sub Availability
None

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:N/E:A/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:U/V:C/RE:M/U:Red

CVSS v3.1 Breakdown

Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CISA Known Exploited Vulnerability

VendorPalo Alto Networks
ProductPAN-OS
NamePalo Alto Networks PAN-OS Out-of-bounds Write Vulnerability
Required ActionApply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. Until the vendor releases an official fix, the following workaround should be implemented: - Restrict User-ID Authentication Portal access to only trusted zones. - Disable User-ID Authentication Portal if not required.
Noteshttps://security.paloaltonetworks.com/CVE-2026-0300 ; https://nvd.nist.gov/vuln/detail/CVE-2026-0300

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Hardware Paloaltonetworks Pa-1410 - All All All
Hardware Paloaltonetworks Pa-1420 - All All All
Hardware Paloaltonetworks Pa-3410 - All All All
Hardware Paloaltonetworks Pa-3420 - All All All
Hardware Paloaltonetworks Pa-3430 - All All All
Hardware Paloaltonetworks Pa-3440 - All All All
Hardware Paloaltonetworks Pa-410 - All All All
Hardware Paloaltonetworks Pa-410r - All All All
Hardware Paloaltonetworks Pa-410r-5g - All All All
Hardware Paloaltonetworks Pa-415 - All All All
Hardware Paloaltonetworks Pa-415-5g - All All All
Hardware Paloaltonetworks Pa-440 - All All All
Hardware Paloaltonetworks Pa-445 - All All All
Hardware Paloaltonetworks Pa-450 - All All All
Hardware Paloaltonetworks Pa-450r - All All All
Hardware Paloaltonetworks Pa-450r-5g - All All All
Hardware Paloaltonetworks Pa-455 - All All All
Hardware Paloaltonetworks Pa-455-5g - All All All
Hardware Paloaltonetworks Pa-455r-5g - All All All
Hardware Paloaltonetworks Pa-460 - All All All
Hardware Paloaltonetworks Pa-501 - All All All
Hardware Paloaltonetworks Pa-505 - All All All
Hardware Paloaltonetworks Pa-510 - All All All
Hardware Paloaltonetworks Pa-520 - All All All
Hardware Paloaltonetworks Pa-540 - All All All
Hardware Paloaltonetworks Pa-5410 - All All All
Hardware Paloaltonetworks Pa-5420 - All All All
Hardware Paloaltonetworks Pa-5430 - All All All
Hardware Paloaltonetworks Pa-5440 - All All All
Hardware Paloaltonetworks Pa-5445 - All All All
Hardware Paloaltonetworks Pa-545-poe - All All All
Hardware Paloaltonetworks Pa-5450 - All All All
Hardware Paloaltonetworks Pa-550 - All All All
Hardware Paloaltonetworks Pa-5540 - All All All
Hardware Paloaltonetworks Pa-555-poe - All All All
Hardware Paloaltonetworks Pa-5550 - All All All
Hardware Paloaltonetworks Pa-5560 - All All All
Hardware Paloaltonetworks Pa-5570 - All All All
Hardware Paloaltonetworks Pa-5580 - All All All
Hardware Paloaltonetworks Pa-560 - All All All
Hardware Paloaltonetworks Pa-7500 - All All All
Hardware Paloaltonetworks Pa-7500-dpc-a - All All All
Operating System Paloaltonetworks Pan-os 10.2.0 All All All
Operating System Paloaltonetworks Pan-os 10.2.1 All All All
Operating System Paloaltonetworks Pan-os 10.2.10 - All All
Operating System Paloaltonetworks Pan-os 10.2.10 h10 All All
Operating System Paloaltonetworks Pan-os 10.2.10 h12 All All
Operating System Paloaltonetworks Pan-os 10.2.10 h14 All All
Operating System Paloaltonetworks Pan-os 10.2.10 h17 All All
Operating System Paloaltonetworks Pan-os 10.2.10 h18 All All
Operating System Paloaltonetworks Pan-os 10.2.10 h2 All All
Operating System Paloaltonetworks Pan-os 10.2.10 h21 All All
Operating System Paloaltonetworks Pan-os 10.2.10 h27 All All
Operating System Paloaltonetworks Pan-os 10.2.10 h3 All All
Operating System Paloaltonetworks Pan-os 10.2.10 h30 All All
Operating System Paloaltonetworks Pan-os 10.2.10 h31 All All
Operating System Paloaltonetworks Pan-os 10.2.10 h4 All All
Operating System Paloaltonetworks Pan-os 10.2.10 h5 All All
Operating System Paloaltonetworks Pan-os 10.2.10 h7 All All
Operating System Paloaltonetworks Pan-os 10.2.10 h9 All All
Operating System Paloaltonetworks Pan-os 10.2.11 All All All
Operating System Paloaltonetworks Pan-os 10.2.12 All All All
Operating System Paloaltonetworks Pan-os 10.2.13 - All All
Operating System Paloaltonetworks Pan-os 10.2.13 h1 All All
Operating System Paloaltonetworks Pan-os 10.2.13 h10 All All
Operating System Paloaltonetworks Pan-os 10.2.13 h16 All All
Operating System Paloaltonetworks Pan-os 10.2.13 h18 All All
Operating System Paloaltonetworks Pan-os 10.2.13 h2 All All
Operating System Paloaltonetworks Pan-os 10.2.13 h3 All All
Operating System Paloaltonetworks Pan-os 10.2.13 h4 All All
Operating System Paloaltonetworks Pan-os 10.2.13 h5 All All
Operating System Paloaltonetworks Pan-os 10.2.13 h7 All All
Operating System Paloaltonetworks Pan-os 10.2.14 All All All
Operating System Paloaltonetworks Pan-os 10.2.15 All All All
Operating System Paloaltonetworks Pan-os 10.2.16 - All All
Operating System Paloaltonetworks Pan-os 10.2.16 h1 All All
Operating System Paloaltonetworks Pan-os 10.2.16 h4 All All
Operating System Paloaltonetworks Pan-os 10.2.16 h6 All All
Operating System Paloaltonetworks Pan-os 10.2.17 - All All
Operating System Paloaltonetworks Pan-os 10.2.18 - All All
Operating System Paloaltonetworks Pan-os 10.2.18 h1 All All
Operating System Paloaltonetworks Pan-os 10.2.18 h5 All All
Operating System Paloaltonetworks Pan-os 10.2.2 All All All
Operating System Paloaltonetworks Pan-os 10.2.3 All All All
Operating System Paloaltonetworks Pan-os 10.2.4 All All All
Operating System Paloaltonetworks Pan-os 10.2.5 All All All
Operating System Paloaltonetworks Pan-os 10.2.6 All All All
Operating System Paloaltonetworks Pan-os 10.2.7 - All All
Operating System Paloaltonetworks Pan-os 10.2.7 h1 All All
Operating System Paloaltonetworks Pan-os 10.2.7 h12 All All
Operating System Paloaltonetworks Pan-os 10.2.7 h16 All All
Operating System Paloaltonetworks Pan-os 10.2.7 h19 All All
Operating System Paloaltonetworks Pan-os 10.2.7 h21 All All
Operating System Paloaltonetworks Pan-os 10.2.7 h24 All All
Operating System Paloaltonetworks Pan-os 10.2.7 h3 All All
Operating System Paloaltonetworks Pan-os 10.2.7 h32 All All
Operating System Paloaltonetworks Pan-os 10.2.7 h6 All All
Operating System Paloaltonetworks Pan-os 10.2.7 h8 All All
Operating System Paloaltonetworks Pan-os 10.2.8 All All All
Operating System Paloaltonetworks Pan-os 10.2.9 All All All
Operating System Paloaltonetworks Pan-os 11.1.0 All All All
Operating System Paloaltonetworks Pan-os 11.1.1 All All All
Operating System Paloaltonetworks Pan-os 11.1.10 - All All
Operating System Paloaltonetworks Pan-os 11.1.10 h1 All All
Operating System Paloaltonetworks Pan-os 11.1.10 h10 All All
Operating System Paloaltonetworks Pan-os 11.1.10 h12 All All
Operating System Paloaltonetworks Pan-os 11.1.10 h21 All All
Operating System Paloaltonetworks Pan-os 11.1.10 h4 All All
Operating System Paloaltonetworks Pan-os 11.1.10 h5 All All
Operating System Paloaltonetworks Pan-os 11.1.10 h7 All All
Operating System Paloaltonetworks Pan-os 11.1.10 h9 All All
Operating System Paloaltonetworks Pan-os 11.1.11 All All All
Operating System Paloaltonetworks Pan-os 11.1.12 All All All
Operating System Paloaltonetworks Pan-os 11.1.13 - All All
Operating System Paloaltonetworks Pan-os 11.1.13 h1 All All
Operating System Paloaltonetworks Pan-os 11.1.13 h2 All All
Operating System Paloaltonetworks Pan-os 11.1.13 h3 All All
Operating System Paloaltonetworks Pan-os 11.1.14 - All All
Operating System Paloaltonetworks Pan-os 11.1.2 All All All
Operating System Paloaltonetworks Pan-os 11.1.3 All All All
Operating System Paloaltonetworks Pan-os 11.1.4 - All All
Operating System Paloaltonetworks Pan-os 11.1.4 h1 All All
Operating System Paloaltonetworks Pan-os 11.1.4 h13 All All
Operating System Paloaltonetworks Pan-os 11.1.4 h15 All All
Operating System Paloaltonetworks Pan-os 11.1.4 h16 All All
Operating System Paloaltonetworks Pan-os 11.1.4 h17 All All
Operating System Paloaltonetworks Pan-os 11.1.4 h18 All All
Operating System Paloaltonetworks Pan-os 11.1.4 h25 All All
Operating System Paloaltonetworks Pan-os 11.1.4 h27 All All
Operating System Paloaltonetworks Pan-os 11.1.4 h32 All All
Operating System Paloaltonetworks Pan-os 11.1.4 h4 All All
Operating System Paloaltonetworks Pan-os 11.1.4 h7 All All
Operating System Paloaltonetworks Pan-os 11.1.4 h9 All All
Operating System Paloaltonetworks Pan-os 11.1.5 All All All
Operating System Paloaltonetworks Pan-os 11.1.6 - All All
Operating System Paloaltonetworks Pan-os 11.1.6 h1 All All
Operating System Paloaltonetworks Pan-os 11.1.6 h10 All All
Operating System Paloaltonetworks Pan-os 11.1.6 h14 All All
Operating System Paloaltonetworks Pan-os 11.1.6 h17 All All
Operating System Paloaltonetworks Pan-os 11.1.6 h19 All All
Operating System Paloaltonetworks Pan-os 11.1.6 h2 All All
Operating System Paloaltonetworks Pan-os 11.1.6 h20 All All
Operating System Paloaltonetworks Pan-os 11.1.6 h21 All All
Operating System Paloaltonetworks Pan-os 11.1.6 h22 All All
Operating System Paloaltonetworks Pan-os 11.1.6 h23 All All
Operating System Paloaltonetworks Pan-os 11.1.6 h25 All All
Operating System Paloaltonetworks Pan-os 11.1.6 h29 All All
Operating System Paloaltonetworks Pan-os 11.1.6 h3 All All
Operating System Paloaltonetworks Pan-os 11.1.6 h4 All All
Operating System Paloaltonetworks Pan-os 11.1.6 h5 All All
Operating System Paloaltonetworks Pan-os 11.1.6 h6 All All
Operating System Paloaltonetworks Pan-os 11.1.6 h7 All All
Operating System Paloaltonetworks Pan-os 11.1.7 - All All
Operating System Paloaltonetworks Pan-os 11.1.7 h1 All All
Operating System Paloaltonetworks Pan-os 11.1.7 h2 All All
Operating System Paloaltonetworks Pan-os 11.1.7 h4 All All
Operating System Paloaltonetworks Pan-os 11.1.8 All All All
Operating System Paloaltonetworks Pan-os 11.1.9 All All All
Operating System Paloaltonetworks Pan-os 11.2.0 All All All
Operating System Paloaltonetworks Pan-os 11.2.1 All All All
Operating System Paloaltonetworks Pan-os 11.2.10 - All All
Operating System Paloaltonetworks Pan-os 11.2.10 h1 All All
Operating System Paloaltonetworks Pan-os 11.2.10 h2 All All
Operating System Paloaltonetworks Pan-os 11.2.10 h3 All All
Operating System Paloaltonetworks Pan-os 11.2.10 h4 All All
Operating System Paloaltonetworks Pan-os 11.2.10 h5 All All
Operating System Paloaltonetworks Pan-os 11.2.11 - All All
Operating System Paloaltonetworks Pan-os 11.2.2 All All All
Operating System Paloaltonetworks Pan-os 11.2.3 All All All
Operating System Paloaltonetworks Pan-os 11.2.4 - All All
Operating System Paloaltonetworks Pan-os 11.2.4 h1 All All
Operating System Paloaltonetworks Pan-os 11.2.4 h10 All All
Operating System Paloaltonetworks Pan-os 11.2.4 h11 All All
Operating System Paloaltonetworks Pan-os 11.2.4 h12 All All
Operating System Paloaltonetworks Pan-os 11.2.4 h14 All All
Operating System Paloaltonetworks Pan-os 11.2.4 h15 All All
Operating System Paloaltonetworks Pan-os 11.2.4 h2 All All
Operating System Paloaltonetworks Pan-os 11.2.4 h4 All All
Operating System Paloaltonetworks Pan-os 11.2.4 h5 All All
Operating System Paloaltonetworks Pan-os 11.2.4 h6 All All
Operating System Paloaltonetworks Pan-os 11.2.4 h7 All All
Operating System Paloaltonetworks Pan-os 11.2.4 h8 All All
Operating System Paloaltonetworks Pan-os 11.2.4 h9 All All
Operating System Paloaltonetworks Pan-os 11.2.5 All All All
Operating System Paloaltonetworks Pan-os 11.2.6 All All All
Operating System Paloaltonetworks Pan-os 11.2.7 - All All
Operating System Paloaltonetworks Pan-os 11.2.7 h1 All All
Operating System Paloaltonetworks Pan-os 11.2.7 h10 All All
Operating System Paloaltonetworks Pan-os 11.2.7 h11 All All
Operating System Paloaltonetworks Pan-os 11.2.7 h12 All All
Operating System Paloaltonetworks Pan-os 11.2.7 h2 All All
Operating System Paloaltonetworks Pan-os 11.2.7 h3 All All
Operating System Paloaltonetworks Pan-os 11.2.7 h4 All All
Operating System Paloaltonetworks Pan-os 11.2.7 h7 All All
Operating System Paloaltonetworks Pan-os 11.2.7 h8 All All
Operating System Paloaltonetworks Pan-os 11.2.8 All All All
Operating System Paloaltonetworks Pan-os 11.2.9 All All All
Operating System Paloaltonetworks Pan-os 12.1.2 All All All
Operating System Paloaltonetworks Pan-os 12.1.3 All All All
Operating System Paloaltonetworks Pan-os 12.1.4 - All All
Operating System Paloaltonetworks Pan-os 12.1.4 h2 All All
Operating System Paloaltonetworks Pan-os 12.1.4 h3 All All
Operating System Paloaltonetworks Pan-os 12.1.5 - All All
Operating System Paloaltonetworks Pan-os 12.1.6 - All All
Hardware Paloaltonetworks Vm-100 - All All All
Hardware Paloaltonetworks Vm-300 - All All All
Hardware Paloaltonetworks Vm-50 - All All All
Hardware Paloaltonetworks Vm-500 - All All All
Hardware Paloaltonetworks Vm-700 - All All All

Vendor Declared Affected Products

SourceVendorProductVersionPlatforms
CNA Palo Alto Networks Cloud NGFW unaffected All custom Not specified
CNA Palo Alto Networks PAN-OS affected 12.1.0 12.1.7 custom Not specified
CNA Palo Alto Networks PAN-OS affected 11.2.0 11.2.12 custom Not specified
CNA Palo Alto Networks PAN-OS affected 11.1.0 11.1.15 custom Not specified
CNA Palo Alto Networks PAN-OS affected 10.2.0 10.2.18-h6 custom Not specified
CNA Palo Alto Networks Prisma Access unaffected All custom Not specified

References

ReferenceSourceLinkTags
security.paloaltonetworks.com/CVE-2026-0300 [email protected] security.paloaltonetworks.com Mitigation, Vendor Advisory
www.cisa.gov/known-exploited-vulnerabilities-catalog 134c704f-9b21-4f2e-91b3-4a467353bcc0 www.cisa.gov US Government Resource
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis
CISA Known Exploited Vulnerabilities catalog CISA www.cisa.gov kev

Additional Advisory Data

SourceTimeEvent
CNA2026-05-06T17:27:00.000ZUpdated with Threat Prevention ID and clarified the Required Configuration section.
CNA2026-05-05T23:00:00.000ZInitial publication.
ADP2026-05-06T00:00:00.000ZCVE-2026-0300 added to CISA KEV

Solutions

CNA: This issue will be fixed in upcoming releases of PAN-OS as captured in the table above. We strongly recommend that you secure access to your User-ID™ Authentication Portal following the instructions in the workarounds section below.

Workarounds

CNA: Customers can mitigate the risk of this issue by taking either of the following actions: * Restrict User-ID™ Authentication Portal access to only trusted zones and in addition, disable Response Pages in the Interface Management Profile attached to every L3 interface in any zone where untrusted/internet traffic can ingress. Keep Response Pages enabled only on interfaces in trust/internal zones where legitimate users' browsers ingress. Refer to Step 6 of the following Live Community article (https://live.paloaltonetworks.com/t5/general-articles/why-it-s-essential-to-secure-your-management-interface/ta-p/1001286) and Knowledgebase article (https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000CqbiCAC) for steps to restrict access. * Disable User-ID™ Authentication Portal if not required. Customers with a Threat Prevention subscription can block attacks for this vulnerability by enabling Threat ID 510019 from Applications and Threats content version 9097-10022. Decoder capabilities necessitate PAN-OS 11.1 or a later version for Threat ID support.

Exploits

CNA: Limited exploitation has been observed targeting Palo Alto Networks User-ID™ Authentication Portals that are exposed to untrusted IP addresses and/or the public internet. Customers following standard security best practices, such as restricting sensitive portals to trusted internal networks are at a greatly reduced risk.

© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report