Palo Alto Networks Zero-Day Exploited to Hack Firewalls

Palo Alto Networks Zero-Day Exploited to Hack Firewalls

Palo Alto Networks is set to patch a critical zero-day vulnerability, CVE-2026-0300, which SecurityWeek reports is actively being exploited in the wild. This flaw specifically impacts the Captive Portal service within PAN-OS software, affecting both PA and VM series firewalls.

This isn’t just another vulnerability; it’s a zero-day actively leveraged against critical network infrastructure. Attackers are clearly targeting the perimeter, aiming for initial access to corporate networks. The exploitation of a firewall, especially through a service like Captive Portal, offers a high-value entry point, potentially bypassing traditional perimeter defenses and gaining a foothold for lateral movement or data exfiltration.

For defenders, this means immediate action. Firewalls are the bedrock of network security, and any compromise here is catastrophic. The attacker’s calculus is straightforward: find the weakest link at the edge, exploit it, and then move deeper. A successful exploit of this zero-day could grant persistent access, enabling long-term espionage or disruptive attacks.

What This Means For You

  • If your organization uses Palo Alto Networks PA or VM series firewalls with the Captive Portal service enabled, you need to identify exposure and prepare for patching immediately. Prioritize this. Do not wait. Audit logs for any unusual activity around your firewalls, especially concerning Captive Portal, from external sources.

Related ATT&CK Techniques

πŸ›‘οΈ Detection Rules

3 rules Β· 6 SIEM formats

3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free β€” export to any SIEM format via the Intel Bot.

critical T1190 Initial Access

Palo Alto Networks Captive Portal Zero-Day Exploitation Attempt

Sigma YAML β€” free preview

Source: Shimi's Cyber World Β· License & reuse

βœ“ Sigma Β· Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Get rules for your SIEM β†’

Indicators of Compromise

IDTypeIndicator
CVE-2026-0300 Auth Bypass Palo Alto Networks PAN-OS software on PA series firewalls
CVE-2026-0300 Auth Bypass Palo Alto Networks PAN-OS software on VM series firewalls
CVE-2026-0300 Auth Bypass Captive Portal service of PAN-OS software
Take action on this incident
πŸ“‘ Monitor paloaltonetworks.com Free Β· 1 watchlist slot Β· instant alerts on new breaches πŸ” Threat intel on Palo Alto Networks All breaches, IOCs & vendor exposure

Related coverage on Palo Alto Networks

Apache HTTP/2 Flaw (CVE-2026-23918) Enables DoS, Potential RCE

The Apache Software Foundation (ASF) has rolled out critical security updates for its HTTP Server, addressing multiple vulnerabilities. Among them is a severe flaw, tracked...

threat-intelvulnerabilitytools
/SCW Vulnerability Desk /HIGH /⚑ 3 IOCs /⚙ 3 Sigma

DAEMON Tools Supply Chain Attack Compromises Official Installers

A new supply chain attack is compromising official DAEMON Tools installers with malicious payloads, according to The Hacker News, citing findings from Kaspersky. These compromised...

threat-intelvulnerabilitymalwaretools
/SCW Vulnerability Desk /HIGH /⚑ 3 IOCs /⚙ 3 Sigma

Microsoft Warns of Sophisticated AitM Phishing Campaign Targeting US Organizations

Microsoft has issued a warning regarding a sophisticated phishing campaign actively targeting organizations in the United States. According to SecurityWeek, the attack vector involves malicious...

threat-intelvulnerabilitymicrosoftphishing
/SCW Vulnerability Desk /MEDIUM /⚑ 2 IOCs