TopVuln

High-risk vulnerability digests

CVE-2026-0300

  • CRITICAL
  • KEV

Palo Alto Networks PAN-OS Out-of-bounds Write Vulnerability

Details

CVSS v3
9.8
CVSS v4
9.3
NVD published
2026-05-06 19:16:35
CISA date
2026-05-06
EPSS
5.3% probability · 90.1th percentile — 2026-05-11
Affected versions
PAN-OS on PA-Series and VM-Series firewalls
Summary
This flaw is an out-of-bounds write vulnerability in the User-ID Captive Portal service of Palo Alto Networks PAN-OS. An unauthenticated remote attacker can send specially crafted packets to achieve arbitrary code execution with root privileges on affected devices. This CVE is known exploited and listed in CISA KEV, making it an immediate high priority threat.
Remediation
Apply the official vendor security patch for this vulnerability as soon as possible. Until patching, restrict access to the User-ID Authentication Portal to only trusted zones, or disable the feature if it is not in use. Follow BOD 22-01 guidance if mitigations are not possible.
Exploit info
This exploit has been recorded in <strong>CISA KEV</strong> (CISA Known Exploited Vulnerabilities catalog, dateAdded 2026-05-06). You may check Exploit-DB or GitHub for potential exploit details.

View on NVD  ·  CISA KEV catalog

TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.

Subscribe — free email digest or paid plan

Information is aggregated from multiple authoritative sources for convenience; verify with NVD and vendors before operational decisions.