Critical Palo Alto Zero-Day Grants Root RCE; Patches Delayed Until May 13
CVE-2026-0300 enables unauthenticated root RCE on Palo Alto firewalls. While CISA has ordered federal agencies to apply mitigations within 72 hours, official p…

Palo Alto Networks published a security advisory on Wednesday, May 6, 2026, regarding a critical zero-day vulnerability in the PAN-OS User-ID Authentication Portal. Identified as CVE-2026-0300, the flaw allows unauthenticated attackers to execute remote code with root privileges on PA-Series and VM-Series firewalls.
The vulnerability is currently being exploited in the wild while a fix remains unavailable. CISA has confirmed active exploitation and ordered U.S. federal agencies to implement mitigations by Saturday. This creates a forced exposure window of approximately one week, as official updates are not scheduled for release until May 13, 2026.
- CVE-2026-0300 affects the PAN-OS User-ID Authentication Portal (Captive Portal), allowing unauthenticated remote code execution (RCE) with root privileges on PA-Series and VM-Series models.
- Severity scales with network configuration: the vulnerability carries a maximum CVSS score of 9.3 when the portal is exposed to the internet or untrusted networks, dropping to 8.7 if access is restricted to trusted internal IP addresses.
- No patches are currently available. Palo Alto Networks plans to begin rolling out updates on May 13, 2026, leaving a seven-day gap between the advisory and the first official remedy.
- CISA has established a 72-hour deadline for federal agencies to apply countermeasures, reflecting the extreme risk posed by root RCE on perimeter security devices.
Technical Breakdown: Captive Portal Buffer Overflow
According to the technical documentation provided by Palo Alto Networks, the vulnerability resides within the User-ID Authentication Portal service (also known as the Captive Portal) integrated into PAN-OS. The flaw is a buffer overflow that allows an unauthenticated attacker to send specially crafted packets to execute arbitrary code with root privileges on the device.
"A buffer overflow vulnerability in the User-ID Authentication Portal (aka Captive Portal) service of Palo Alto Networks PAN-OS software allows an unauthenticated attacker to execute arbitrary code with root privileges on the PA-Series and VM-Series firewalls by sending specially crafted packets"
The compromise of a perimeter firewall with maximum administrative privileges poses an existential risk to network infrastructure. As PA-Series and VM-Series models typically serve as critical boundary nodes, an attacker could modify traffic rules, intercept communications, or pivot into internal segments without facing further security checks. The danger is compounded by the fact that the affected service is designed to authenticate users and devices, a function often exposed to external or broad-access network zones.
Assessing Risk: Why CVSS Scores Vary Between 9.3 and 8.7
The threat assessment is not uniform across all installations. The CVSS score for CVE-2026-0300 reaches its peak of 9.3 in configurations where the User-ID Authentication Portal is enabled and reachable from the internet or untrusted networks. If access is restricted to trusted internal IP addresses, the score is adjusted to 8.7.
This distinction does not diminish the criticality of the flaw but serves as a risk roadmap. Organizations exposing the service externally without restrictions are in the highest danger tier. Conversely, those who have already segmented the Captive Portal into internal zones reduce the likelihood of remote compromise, though they do not eliminate it. According to the vendor, customers following network segmentation best practices face a significantly reduced risk profile.
The Patch Gap: CISA Deadlines vs. Vendor Timelines
Following the advisory, CISA confirmed active exploitation and issued a direct order to federal agencies: apply mitigations by Saturday, May 9, 2026. This 72-hour window reflects the urgency of a root RCE on perimeter hardware.
However, an institutional challenge has emerged: federal agencies must comply with a mitigation directive that cannot yet be resolved via software updates. Palo Alto Networks has stated that patches will not be distributed until at least May 13, 2026. The absence of an immediate fix leaves every exposed instance a potential target while administrators are unable to apply a permanent code-level update.
Rapid7 estimates that updates should cover many affected versions by that date, but there are no guarantees for full coverage across all PAN-OS 10.2, 11.1, and 11.2 branches. This gap forces a period of sustained exposure. Public administrations and private enterprises alike must restrict functionality and access to manage the risk. The situation is further complicated by reports from several security firms indicating active exploitation, though the full scope of the campaign and the identity of the actors remain undisclosed.
Scope of Impact: Affected Models and Versions
The vulnerability does not affect all Palo Alto Networks products. Impacted models are limited to PA-Series and VM-Series firewalls with an active User-ID Authentication Portal service running specific versions of PAN-OS 10.2, 11.1, and 11.2. Devices that do not utilize the Captive Portal or belong to different hardware families are outside the scope of this threat.
Current active exploitation reported by Palo Alto Networks and CISA appears targeted at portal instances publicly exposed to the internet. While this narrows the immediate field of attack, the risk of mass scanning and escalation remains high once the technical details of the flaw are widely understood, particularly during the week-long wait for patches.
Mitigation Strategies
Organizations managing affected firewall infrastructure must take immediate configuration actions, as a software-based resolution is unavailable until May 13. Priorities include drastically reducing the attack surface and re-evaluating service access controls.
- Inventory Verification: Identify all PA-Series and VM-Series models running PAN-OS 10.2, 11.1, or 11.2 with the User-ID Authentication Portal enabled.
- Restrict Network Access: Limit Captive Portal access exclusively to trusted internal segments, removing any rules that allow direct exposure to the internet or uncontrolled networks.
- Disable the Service: If the portal is not essential to corporate authentication policies, temporary deactivation removes the attack vector entirely until a patch can be applied.
- Enhance Monitoring: Analyze firewall logs for anomalous connections or suspicious traffic targeting the User-ID Authentication Portal interfaces, paying close attention to external sources.
The Governance Challenge: Navigating the Zero-Day Window
The CVE-2026-0300 incident highlights a structural tension in modern cybersecurity. On one side, regulatory bodies react with incident-response speed, imposing deadlines measured in hours. On the other, vendors often lack an immediate remedy, particularly for zero-days that require rigorous development and testing cycles.
This results in the burden of protection shifting temporarily from software providers to network operators, who must adjust architectures and workflows under emergency conditions. For perimeter firewalls—the very devices meant to filter threats—this scenario is particularly insidious. How organizations manage this seven-day waiting period will likely determine the difference between a contained incident and a structural breach.
Frequently Asked Questions
Which versions of PAN-OS are affected?
The vulnerability applies to specific versions of PAN-OS 10.2, 11.1, and 11.2 on PA-Series and VM-Series firewalls where the User-ID Authentication Portal is configured and active.
Is it safe to wait for the May 13 patch without taking action?
No. Active exploitation has been confirmed by both CISA and Palo Alto Networks. Without a patch, mitigation depends entirely on modifying access policies or disabling the service.
Is my firewall vulnerable if I do not use the Captive Portal?
No. The flaw is only present on devices where the User-ID Authentication Portal service is enabled. If the portal is disabled, the attack vector is not present, even if the model is among those potentially affected.
Information has been verified against cited sources and is current as of publication.