[Security Vulnerability Alert] Palo Alto Networks PAN-OS has a critical cybersecurity vulnerability (CVE-2026-0300).

 
2026/5/7 ~ 2026/11/7
View Count:40

Forwarded from Taiwan Computer Network Crisis Management and Coordination Center: Cybersecurity Alert TWCERTCC-200-202605-00000002

[Description]
A buffer overflow vulnerability (CVE-2026-0300, CVSS: 9.3) exists in the User-ID authentication portal service of Palo Alto Networks' firewall operating system PAN-OS. This vulnerability allows unauthenticated attackers to execute arbitrary code with root privileges on PA series and VM system firewalls by sending specially crafted data.

[Affected Platforms]
PAN-OS versions prior to 12.1.4-h5 (excluding 12.1.4)
PAN-OS versions prior to 12.1.7 (excluding 12.1.7)
PAN-OS versions prior to 11.2.4-h17 (excluding 11.2.4)
PAN-OS versions prior to 11.2.7-h13 (excluding 11.2.7)
PAN-OS versions prior to 11.2.10-h6 (excluding 11.2.10)
PAN-OS versions prior to 11.2.12 (excluding 11.2.12)
PAN-OS versions prior to 11.1.4-h33 (excluding 11.1.4)
PAN-OS versions prior to 11.1.6-h32 (excluding 11.1.6)
PAN-OS versions prior to 11.1.7-h6 (excluding 11.1.7)
PAN-OS versions prior to 11.1.10-h25 (excluding 11.1.10)
PAN-OS versions prior to 11.1.13-h5 (excluding 11.1.13) Versions prior to 11.1.15 (excluding 11.1.15)
PAN-OS versions prior to 10.2.7-h34 (excluding 10.2.7)
PAN-OS versions prior to 10.2.10-h36 (excluding 10.2.10)
PAN-OS versions prior to 10.2.13-h21 (excluding 10.2.13)
PAN-OS versions prior to 10.2.16-h7 (excluding 10.2.16)
PAN-OS versions prior to 10.2.18-h6 (excluding 10.2.18)

[Recommended Action]
Patch according to the solution released on the official website: https://security.paloaltonetworks.com/CVE-2026-0300

[Reference]
1. https://www.twcert.org.tw/tw/cp-169-10898-012f2-1.html

Files
system_update_alt官方網站
system_update_alt參考資料
Top↑