Palo Alto PAN-OS Flaw Under Active Exploitation Enables Remote Code Execution

Summary

Palo Alto Networks has issued a critical advisory regarding a buffer overflow vulnerability in its PAN-OS software. The flaw, tracked as CVE-2026-0300, allows for unauthenticated remote code execution and is reportedly being actively exploited in the wild.

IFF Assessment

FOE

This vulnerability allows unauthenticated remote code execution, posing a significant threat to organizations using the affected PAN-OS software.

Severity

9.3 Critical

The CVSS score of 9.3 indicates a critical severity, primarily due to the potential for unauthenticated remote code execution. This score is applicable when the User-ID Authentication Portal is exposed to the internet.

Defender Context

Organizations using Palo Alto Networks' PAN-OS should immediately review their configurations and apply available patches. The active exploitation of this vulnerability underscores the importance of prompt security updates and monitoring for signs of compromise, especially concerning remote code execution risks.

Read Full Story →