Palo Alto Firewall RCE Vulnerability Actively Exploited

CVE-2026-0300, a critical RCE vulnerability in Palo Alto Networks firewalls, is being actively exploited; mitigations available.

Palo Alto Firewall RCE Vulnerability Actively Exploited

Image: helpnetsecurity.com

Palo Alto Networks has confirmed that a critical remote code execution (RCE) vulnerability, identified as CVE-2026-0300, affecting its firewalls is being actively exploited by attackers. The company urged customers to implement mitigations immediately while it continues to develop permanent fixes.

The vulnerability, which carries a CVSS score of 9.3, impacts PAN-OS versions prior to 10.2.12-h1, 11.0.6-h1, and 11.1.4-h1. It allows unauthenticated attackers to execute arbitrary code with root privileges on affected devices via specially crafted requests to the management interface.

Palo Alto Networks recommends restricting access to the management interface to trusted internal IP addresses and disabling the management interface from the internet if not required. The company is working on hotfixes and expects to release them by May 10, 2026.

Security researchers have observed active exploitation attempts in the wild, targeting organizations in the finance, healthcare, and government sectors. Customers are advised to check their device configurations and apply the recommended workarounds immediately.

❓ Frequently Asked Questions

What is CVE-2026-0300?

CVE-2026-0300 is a critical remote code execution vulnerability in Palo Alto Networks PAN-OS that allows unauthenticated attackers to execute arbitrary code with root privileges on affected firewalls.

Which versions of PAN-OS are affected?

PAN-OS versions prior to 10.2.12-h1, 11.0.6-h1, and 11.1.4-h1 are affected.

What should I do to protect my firewall?

Restrict access to the management interface to trusted internal IP addresses and disable it from the internet if not required. Apply the recommended workarounds immediately.

📰 Source:
helpnetsecurity.com →
Share: