The “gold standard” of enterprise firewalls is under siege. Palo Alto Networks has issued an emergency advisory for CVE-2026-0300, a critical buffer overflow vulnerability in its PAN-OS software that is currently being exploited in the wild.
The flaw allows unauthenticated attackers to gain full control of the network perimeter, and bypassing every line of defense.
Key Points
- Vulnerability: CVE-2026-0300 (Critical Buffer Overflow)
- Impact: Unauthenticated Remote Code Execution (RCE) with root privileges.
- Status: Active exploitation confirmed by Mandiant and CISA.
- Affected Systems: PA-Series, VM-Series, and CN-Series running specific PAN-OS versions.
- Immediate Action: Apply emergency fixes or disable the captive portal/GlobalProtect interfaces if unpatched.
The Incident: Zero-Day Exploitation of the Perimeter
Security researchers have dubbed the recent wave of attacks targeting Palo Alto Networks appliances as “Operation Crimson Perimeter.” Threat actors are leveraging a critical flaw in the way PAN-OS handles specific packet headers within its management interface and GlobalProtect portals.
Unlike typical vulnerabilities that require an initial foothold, CVE-2026-0300 grants attackers access from the “outside-in,” requiring no valid credentials or user interaction.
Who is Affected?
The vulnerability resides in the management plane of PAN-OS, specifically affecting:
- PAN-OS 11.1 (Versions prior to 11.1.2-h3)
- PAN-OS 11.0 (Versions prior to 11.0.4-h1)
- PAN-OS 10.2 (Versions prior to 10.2.8-h3)
Organizations using GlobalProtect gateways or those with Web Management Interfaces exposed to the public internet are at the highest risk.
Technical: The Buffer Overflow
Technically, CVE-2026-0300 is a classic heap-based buffer overflow. When the system processes a specially crafted HTTP request, it fails to properly validate the length of the input data before copying it into a fixed-size memory buffer.
By sending a payload that exceeds this limit, an attacker can overwrite adjacent memory sectors, redirecting the CPU’s execution flow to their own malicious code. Because the vulnerable service runs with root privileges, the resulting shell gives the attacker absolute command over the firewall’s operating system.
Threat Actor
While attribution is still developing, early telemetry from Mandiant suggests a state-sponsored espionage group is behind the initial zero-day phase. After gaining access, the attackers have been observed deploying:
- Backdoor Web Shells: To maintain persistence even after reboots.
- Credential Searchers: Tools designed to scrape internal clear-text passwords from the device’s configuration files.
Impact and Risks
The implications of a compromised firewall are catastrophic. An attacker can:
- Pivot Internally: Use the firewall as a “jump box” to attack the internal LAN.
- Decrypt Traffic: Inspect encrypted SSL/TLS traffic passing through the device.
- Data Exfiltration: Silently funnel sensitive data out of the network through an encrypted tunnel created on the firewall itself.
Mitigation
Palo Alto Networks has released emergency patches. If you cannot patch immediately, follow these steps:
- Restrict Access: Ensure the management interface is not accessible from the public internet. Use an out-of-band management network or a restricted VPN.
- Enable Threat IDs: For those with active Threat Prevention subscriptions, ensure Threat IDs 95342 and 95345 are set to “Block.”
- Audit Logs: Look for suspicious “admin” logins from unusual IP addresses or unexpected system file modifications in the /var/log/ directory.
FAQ
What is CVE-2026-0300?
- It is a critical buffer overflow vulnerability in Palo Alto Networks PAN-OS that allows an unauthenticated attacker to execute arbitrary code with root privileges via the management interface or GlobalProtect portal.
Has CVE-2026-0300 been exploited?
- Yes, Palo Alto Networks and CISA have confirmed that this vulnerability is being actively exploited in the wild by advanced persistent threat (APT) groups.
How do I fix the PAN-OS buffer overflow vulnerability?
- You must update your firewall to the latest updated version provided by Palo Alto Networks (e.g., PAN-OS 11.1.2-h3 or higher). Disabling public access to the management interface is also highly recommended.








