轉發 台灣電腦網路危機處理暨協調中心 資安訊息警訊 TWCERTCC-200-202605-00000002
[內容說明]
Palo Alto Networks 的防火牆作業系統 PAN-OS的User-ID驗證入口網站服務存在緩衝區溢位漏洞(CVE-2026-0300,CVSS :9.3),此漏洞允許未經身分驗證的攻擊者透過發送特製的資料,在PA系列和VM系統防火牆上,以root權限執行任意程式碼。
[影響平台]
PAN-OS 12.1.4-h5(不含)以前版本
PAN-OS 12.1.7(不含)以前版本
PAN-OS 11.2.4-h17(不含)以前版本
PAN-OS 11.2.7-h13(不含)以前版本
PAN-OS 11.2.10-h6(不含)以前版本
PAN-OS 11.2.12(不含)以前版本
PAN-OS 11.1.4-h33(不含)以前版本
PAN-OS 11.1.6-h32(不含)以前版本
PAN-OS 11.1.7-h6(不含)以前版本
PAN-OS 11.1.10-h25(不含)以前版本
PAN-OS 11.1.13-h5(不含)以前版本
PAN-OS 11.1.15(不含)以前版本
PAN-OS 10.2.7-h34(不含)以前版本
PAN-OS 10.2.10-h36(不含)以前版本
PAN-OS 10.2.13-h21(不含)以前版本
PAN-OS 10.2.16-h7(不含)以前版本
PAN-OS 10.2.18-h6(不含)以前版本
[建議措施]
根據官方網站釋出的解決方式進行修補: https://security.paloaltonetworks.com/CVE-2026-0300
[參考資料]
1. https://www.twcert.org.tw/tw/cp-169-10898-012f2-1.html
Forwarded from Taiwan Computer Network Crisis Management and Coordination Center: Cybersecurity Alert TWCERTCC-200-202605-00000002
[Description]
A buffer overflow vulnerability (CVE-2026-0300, CVSS: 9.3) exists in the User-ID authentication portal service of Palo Alto Networks' firewall operating system PAN-OS. This vulnerability allows unauthenticated attackers to execute arbitrary code with root privileges on PA series and VM system firewalls by sending specially crafted data.
[Affected Platforms]
PAN-OS versions prior to 12.1.4-h5 (excluding 12.1.4)
PAN-OS versions prior to 12.1.7 (excluding 12.1.7)
PAN-OS versions prior to 11.2.4-h17 (excluding 11.2.4)
PAN-OS versions prior to 11.2.7-h13 (excluding 11.2.7)
PAN-OS versions prior to 11.2.10-h6 (excluding 11.2.10)
PAN-OS versions prior to 11.2.12 (excluding 11.2.12)
PAN-OS versions prior to 11.1.4-h33 (excluding 11.1.4)
PAN-OS versions prior to 11.1.6-h32 (excluding 11.1.6)
PAN-OS versions prior to 11.1.7-h6 (excluding 11.1.7)
PAN-OS versions prior to 11.1.10-h25 (excluding 11.1.10)
PAN-OS versions prior to 11.1.13-h5 (excluding 11.1.13) Versions prior to 11.1.15 (excluding 11.1.15)
PAN-OS versions prior to 10.2.7-h34 (excluding 10.2.7)
PAN-OS versions prior to 10.2.10-h36 (excluding 10.2.10)
PAN-OS versions prior to 10.2.13-h21 (excluding 10.2.13)
PAN-OS versions prior to 10.2.16-h7 (excluding 10.2.16)
PAN-OS versions prior to 10.2.18-h6 (excluding 10.2.18)
[Recommended Action]
Patch according to the solution released on the official website: https://security.paloaltonetworks.com/CVE-2026-0300
[Reference]
1. https://www.twcert.org.tw/tw/cp-169-10898-012f2-1.html