CVE-2026-0300 is a do-now item for teams running Palo Alto Networks firewalls with the User-ID Authentication Portal enabled. Palo Alto Networks rates the vulnerability HIGHEST urgency and CRITICAL severity 9.3, and labels exploit maturity as ATTACKED [10]. CERT-EU and Unit 42 describe it as a PAN-OS buffer overflow in the User-ID Authentication Portal, also known as Captive Portal, that can allow unauthenticated root-level code execution on affected PA-Series and VM-Series firewalls [
17][
15].
Why this vulnerability is urgent
The vulnerable service is network-facing in risky deployments, and Palo Alto's advisory characteristics make it a high-priority exposure: network attack vector, low attack complexity, no privileges required, no user interaction, no attack requirements, and automatable exploitation [10]. Unit 42 says it is aware of limited exploitation and is tracking likely state-sponsored activity exploiting the flaw . The Canadian Centre for Cyber Security also reported that Palo Alto received active-exploitation reports and that CISA added CVE-2026-0300 to the KEV database on May 6, 2026 .


/Black%20Tesla%20by%20Dmitry%20Novikov%20via%20Unsplash.jpg)


