Gemeente Cyber Dreigingsradar
Kritiek
Terug naar het overzicht
MiddenKwetsbaarheidRapid7 Blog

Critical Buffer Overflow in Palo Alto Networks PAN-OS User-ID Authentication Portal (CVE-2026-0300)

Overview On May 6, 2026, Palo Alto Networks published a security advisory for CVE-2026-0300 , a critical unauthenticated buffer overflow vulnerability affecting PAN-OS PA-Series and VM-Series firewall appliances. Prisma Access, Cloud NGFW, and Panorama appliances are not affected by this vulnerability. The vulnerability carries a CVSSv4 score of 9.3 and has been confirmed as exploited in the wild by the vendor. CVE-2026-0300 is a buffer overflow ( CWE-787 ) in the User-ID™ Authentication Portal (also known as Captive Portal), a non-default PAN-OS feature used to map IP addresses to usernames.

Prioriteit & onderbouwing

42 / 100

Prioriteit: Laag

Monitoren

Laag (42/100): monitoren. Zwaarst wegend: gemeentelijke relevantie en technische ernst.

Threat Score42 / 100

midden

  • Technische ernst (severity): Genormaliseerde ernst 'medium'; geen CVSS-score beschikbaar.
Exploit Score10 / 100

laag

  • Geen exploit bekend: Er is geen exploit of actief misbruik bekend.
Municipal Relevance Score50 / 100

verhoogd

  • Gemeentelijke relevantie: Relevantiescore 50/100 uit de relevantie-engine (module 5).
Action Urgency Score42 / 100

midden

  • Technische ernst: Threat Score 42/100 x gewicht 25%.
  • Exploitatie: Exploit Score 10/100 x gewicht 25%.
  • Gemeentelijke relevantie: Relevantiescore 50/100 x gewicht 22%.
  • Betrouwbaarheid van het signaal: Confidence 'likely' x gewicht 12%.
  • Blootstellingskans: Geschatte blootstelling 42% x gewicht 10%.
  • Betrouwbaarheid van de bron: Bronbetrouwbaarheid 74% x gewicht 6%.

De priority_score is de Action Urgency Score: een gewogen combinatie van de technische ernst, de exploitatie en de gemeentelijke relevantie.

Toelichting

Overview On May 6, 2026, Palo Alto Networks published a security advisory for CVE-2026-0300 , a critical unauthenticated buffer overflow vulnerability affecting PAN-OS PA-Series and VM-Series firewall appliances. Prisma Access, Cloud NGFW, and Panorama appliances are not affected by this vulnerability. The vulnerability carries a CVSSv4 score of 9.3 and has been confirmed as exploited in the wild by the vendor. CVE-2026-0300 is a buffer overflow ( CWE-787 ) in the User-ID™ Authentication Portal (also known as Captive Portal), a non-default PAN-OS feature used to map IP addresses to usernames. An unauthenticated remote attacker can exploit this vulnerability by sending specially crafted packets to a device with the Authentication Portal enabled, achieving arbitrary code execution with root privileges on the affected firewall. No authentication or user interaction is required. Palo Alto Networks has confirmed limited exploitation in the wild targeting Authentication Portals exposed to either untrusted IP addresses or the public internet. No patches are currently available; fixed versions are expected to begin rolling out on May 13, 2026, with additional releases through May 28, 2026. PAN-OS is among the most widely deployed enterprise firewall operating systems in the world. Shodan identifies approximately 225,000 internet-facing PAN-OS instances, representing a significant attack surface. Rapid7 strongly urges all organizations running affected PAN-OS versions with the User-ID Authentication Portal enabled to apply the available workarounds immediately and prioritize patching as soon as fixed versions become available. Update #1: On May 6, 2026, CVE-2026-0300 was added to the U.S. Cybersecurity and Infrastructure Security Agency's (CISA) list of known exploited vulnerabilities (KEV), based on evidence of active exploitation. Palo Alto Networks Unit 42 also published a threat brief attributing observed exploitation to CL-STA-1132, a likely state-sponsored threat cluster that deployed open-source tunneling tools and conducted Active Directory enumeration following initial compromise. Mitigation guidance Organizations running PA-Series and VM-Series firewalls with the User-ID™ Authentication Portal enabled should apply the available workarounds immediately and prioritize patching as soon as fixed versions are released. Check the official documentation to establish whether the affected User-ID™ Authentication Portal is currently enabled. According to the Palo Alto Networks advisory, the following versions are affected by CVE-2026-0300: Product Affected Unaffected Fix ETA PAN-OS 12.1 < 12.1.4-h5 < 12.1.7 >= 12.1.4-h5 >= 12.1.7 05/13 05/28 PAN-OS 11.2 < 11.2.4-h17 < 11.2.7-h13 < 11.2.10-h6 < 11.2.12 >= 11.2.4-h17 >= 11.2.7-h13 >= 11.2.10-h6 >= 11.2.12 05/28 05/13 05/13 05/28 PAN-OS 11.1 < 11.1.4-h33 < 11.1.6-h32 < 11.1.7-h6 < 11.1.10-h25 < 11.1.13-h5 < 11.1.15 >= 11.1.4-h33 >= 11.1.6-h32 >= 11.1.7-h6 >= 11.1.10-h25 >= 11.1.13-h5 >= 11.1.15 05/13 05/13 05/28 05/13 05/13 05/28 PAN-OS 10.2 < 10.2.7-h34 < 10.2.10-h36 < 10.2.13-h21 < 10.2.16-h7 < 10.2.18-h6 >= 10.2.7-h34 >= 10.2.10-h36 >= 10.2.13-h21 >= 10.2.16-h7 >= 10.2.18-h6 05/28 05/13 05/28 05/28 05/13 As of May 13, 2026, the first round of patches has been published. Until the remaining awaited patches are available, Palo Alto Networks recommends one of the following workarounds: Restrict User-ID™ Authentication Portal access to only trusted internal zones. Refer to Step 6 of the Live Community article and the Knowledgebase article for instructions on restricting access. Disable User-ID™ Authentication Portal entirely if it is not required (Device > User Identification > Authentication Portal Settings > uncheck Enable Authentication Portal). Please refer to the vendor advisory for the latest guidance. Rapid7 customers Exposure Command, InsightVM, and Nexpose Exposure Command, InsightVM, and Nexpose customers can assess exposure to CVE-2026-0300 with authenticated vulnerability checks available in the May 6th, 2026 content release. Updates May 6, 2026 : Initial publication. May 7, 2026 : Updated overview to note the addition to CISA KEV and the Unit 42 threat brief attributing exploitation to CL-STA-1132. May 13, 2026 : Updated Mitigation guidance section to state that patches expected on May 13 have been published.

Onderbouwing van de classificatie

Categorie 'vulnerability': er is een CVE aan de dreiging gekoppeld. Severity 'medium' bepaald op basis van: trefwoord 'unauthenticated'. Confidence 'likely': gerenommeerd securityonderzoek (Rapid7 Blog). Herkende leveranciers/producten: Palo Alto.

Kwetsbaarheden

CVE-2026-0300Prioriteitsscore 0.0 / 100
CVSS
EPSS
KEV
Nee

Gemeentelijke relevantie

50

Deze dreiging scoort 50/100 voor de gemeentelijke relevantie. Meegewogen: getroffen internetgerichte technologie, veelgebruikte gemeentelijke technologie en impact op identity of Microsoft 365. De score is verlaagd vanwege een vooralsnog uitsluitend theoretische kwetsbaarheid. Geraakte processen: Microsoft 365 en identity, Netwerk en infrastructuur.

Bestuurlijke duiding

Deze dreiging is relevant voor de gemeente. Een onverholpen kwetsbaarheid in gemeentelijke systemen vergroot de kans op misbruik. De impact is beheersbaar mits de geadviseerde maatregelen tijdig worden opgevolgd. Laat de CISO de voortgang bewaken en escaleer richting directie zodra nieuwe signalen daartoe aanleiding geven.

Geraakte processen

Microsoft 365 en identityNetwerk en infrastructuur

Geraakte technologie

Palo Alto

Betrokken rollen

CISO · ISO · SOC · ICT beheer

Operationele acties

  • Bepaal de patchstatus van de getroffen producten en plan installatie binnen de geldende patchtermijn.
  • Beperk of isoleer internetgerichte systemen tot de update is doorgevoerd.
  • Verhoog tijdelijk de monitoring op de betrokken systemen en koppelingen.

Concrete stappen voor ICT-beheer en het securityteam.

Aanbevolen acties

  • Inventariseer of de getroffen producten in de eigen omgeving in gebruik zijn.
  • Installeer beschikbare updates of pas de geadviseerde mitigaties toe.
  • Geef voorrang aan internetgerichte systemen.

Dit zijn algemene handelingsperspectieven. Stem de opvolging af op de eigen omgeving en het ISMS van uw gemeente.

Kenmerken

Ernst
Midden
Categorie
Kwetsbaarheid
Zekerheid
Waarschijnlijk
Status
Verrijkt
CVE's
CVE-2026-0300
Prioriteitsscore
42 / 100 · Laag
Bron
Rapid7 Blog
Gepubliceerd
6 mei 2026

Labels

Actief misbruiktOpensourceEntra IDFirewallPalo Alto
Originele publicatie