Critical PAN-OS Captive Portal Zero-Day: Unauthenticated RCE via Buffer Overflow (CVE-2026-0300)

Overview

Unit 42, the threat intelligence team at Palo Alto Networks, has disclosed a critical zero-day vulnerability affecting the PAN-OS User-ID Authentication Portal, tracked as CVE-2026-0300. This flaw, a buffer overflow in the captive portal component, enables unauthenticated remote code execution (RCE) on vulnerable appliances. The vulnerability is believed to have been actively exploited in the wild prior to public disclosure, raising urgent concerns for organizations relying on PAN-OS firewalls and gateways.

Critical PAN-OS Captive Portal Zero-Day: Unauthenticated RCE via Buffer Overflow (CVE-2026-0300)
Source: unit42.paloaltonetworks.com

Technical Details

CVE-2026-0300 resides in the PAN-OS Captive Portal functionality, which is part of the User-ID Authentication Portal. The captive portal is typically used to enforce authentication for guest users before granting network access. A buffer overflow occurs when input data exceeds the allocated memory buffer, allowing an attacker to overwrite adjacent memory locations. In this case, specially crafted HTTP requests sent to the captive portal handler can trigger the overflow, leading to arbitrary code execution with the privileges of the PAN-OS web server.

Exploitation does not require any prior authentication or user interaction. An attacker simply needs network access to the management interface or the captive portal endpoint. This makes CVE-2026-0300 a particularly dangerous unauthorized RCE vector, enabling adversaries to take full control of affected devices. Unit 42 notes that the vulnerability was discovered during an incident response engagement, suggesting real-world exploitation attempts.

Affected Systems

The vulnerability affects multiple versions of PAN-OS, including both PA-Series hardware firewalls and virtualized VM-Series instances. Specific vulnerable versions include:

Organizations running any of these versions with the User-ID Authentication Portal enabled are at immediate risk. The captive portal is often enabled for guest Wi-Fi or network access control, but even if not actively used, the service may be running on default configurations.

Potential Impact

Successful exploitation of CVE-2026-0300 can have severe consequences:

Given that PAN-OS devices often serve as the primary security perimeter, a breach can escalate to a full-scale incident.

Critical PAN-OS Captive Portal Zero-Day: Unauthenticated RCE via Buffer Overflow (CVE-2026-0300)
Source: unit42.paloaltonetworks.com

Mitigation and Remediation

Palo Alto Networks has released security patches for the affected PAN-OS versions. Administrators should take immediate action:

  1. Apply the patch: Update to PAN-OS 10.1.6, 10.0.11, 9.1.16, or later versions that include the fix. Refer to the official advisory for exact version numbers.
  2. Disable captive portal if not required, or restrict access to the User-ID Authentication Portal via ACLs.
  3. Monitor for indicators of compromise (IoCs): Unit 42 has shared IoCs related to the exploitation attempts; check logs for anomalous HTTP requests to the captive portal.
  4. Segment networks: Ensure management interfaces are not exposed to the internet unless necessary, and use strong access controls.

Recommendations for Security Teams

Given the zero-day nature and active exploitation, organizations should treat CVE-2026-0300 as a critical priority:

Conclusion

CVE-2026-0300 represents a critical threat to any organization using PAN-OS with captive portal capabilities. The combination of unauthorized access, remote code execution, and active exploitation demands swift action. By applying patches, restricting access, and monitoring for malicious activity, defenders can significantly reduce the risk. Unit 42 continues to track this vulnerability and will provide further updates as the situation evolves.

Recommended

Discover More

Pixel Perks: Ranking Google's Top Exclusive FeaturesNVIDIA and Ineffable Intelligence Join Forces to Revolutionize Reinforcement Learning InfrastructureNavigating Observability and Human Intuition in the Age of AI Software Development7 Game-Changing Features of Lian Li’s DK07 Wood Standing Desk Dual-PC ChassisUnderstanding Jakarta EE: A Comprehensive Q&A Guide