Site icon Fix I.T. Phill – Your Go-To Tech Guru

PAN-OS CVE-2026-0300: Palo Alto Firewall Mitigation and Patch Guide

Network firewall edge protected with security update shields for PAN-OS CVE-2026-0300 mitigation

Network firewall edge protected with security update shields for PAN-OS CVE-2026-0300 mitigation

Impact statement: PAN-OS CVE-2026-0300 is a critical firewall vulnerability affecting Palo Alto Networks PA-Series and VM-Series firewalls when the User-ID Authentication Portal, also called Captive Portal, is enabled and reachable from untrusted networks. Palo Alto Networks rates it Critical with CVSS 9.3, marks exploit maturity as attacked, and says limited exploitation has been observed against exposed portals.

This is an edge-security emergency because the affected component sits on the network perimeter. If your firewall uses Authentication Portal and that portal can be reached from the internet or another untrusted zone, treat this as urgent: restrict the portal now, disable it if you do not need it, apply Threat Prevention coverage if available, and schedule fixed PAN-OS releases as soon as your supported branch has one.

Who Is Affected

The risk applies to PA-Series and VM-Series firewalls running affected PAN-OS versions when the required exposure configuration is present. Palo Alto’s advisory says Prisma Access, Cloud NGFW, and Panorama appliances are not impacted by this vulnerability.

The highest-risk configuration is:

Affected PAN-OS Branches

As of May 10, 2026, Palo Alto’s advisory lists the following affected branches and planned fixed releases. Use the vendor advisory as the source of truth before starting a maintenance window, because the release table can change quickly during an active incident.

PAN-OS branch Affected before Fixed releases listed by Palo Alto
12.1 12.1.4-h5 and 12.1.7 paths 12.1.4-h5, 12.1.7
11.2 11.2.4, 11.2.7, 11.2.10, and 11.2.12 paths 11.2.4-h17, 11.2.7-h13, 11.2.10-h6, 11.2.12
11.1 11.1.4, 11.1.6, 11.1.7, 11.1.10, 11.1.13, and 11.1.15 paths 11.1.4-h33, 11.1.6-h32, 11.1.7-h6, 11.1.10-h25, 11.1.13-h5, 11.1.15
10.2 10.2.7, 10.2.10, 10.2.13, 10.2.16, and 10.2.18 paths 10.2.7-h34, 10.2.10-h36, 10.2.13-h21, 10.2.16-h7, 10.2.18-h6

What To Do Right Now

  1. Confirm whether Authentication Portal is enabled. In the firewall GUI, check Device > User Identification > Authentication Portal Settings.
  2. Confirm where response pages are enabled. In the GUI, check Network > Interface, select the relevant interface, then review the advanced management interface profile settings.
  3. Remove untrusted reachability. Restrict Authentication Portal access to trusted internal zones only, and remove response-page exposure from interfaces that receive internet or other untrusted traffic.
  4. Disable Authentication Portal if it is not required. This is the cleanest mitigation for environments that do not actively use it.
  5. Apply Threat Prevention coverage if available. Palo Alto says customers with a Threat Prevention subscription can block attacks for this vulnerability with Threat ID 510019 from Applications and Threats content version 9097-10022. PAN-OS 11.1 or later is required for that Threat ID support.
  6. Plan the PAN-OS update. Track the fixed release for your branch, read the release notes, back up configuration, and patch in a controlled maintenance window.

Safe Version Checks

These checks do not validate the vulnerability against a target. They only help an administrator identify the local firewall branch, HA state, and update posture.

show system info | match sw-version
show system info | match model
show high-availability state
show jobs all

For Panorama-managed fleets, inventory every managed firewall, including lab, standby, remote-office, and VM-Series devices. Do not assume the high-availability peer, spare unit, or cloud-hosted firewall is on the same release as the active unit.

Patch Planning For HA Pairs And Hosting Networks

If this firewall protects hosting, customer VPN, management, RDP, SSH, mail, or control-panel traffic, plan the change like an edge maintenance event, not like a routine desktop update.

Logs And Review Items

Because the vendor and CISA both treat this as active-attack risk, do a defensive review after mitigation. Keep it practical and focused:

Customer Communication

For MSPs, hosting providers, and businesses with customer-facing systems behind Palo Alto firewalls, the customer message should stay calm and specific:

Fix I.T. Phill Guidance

Do not wait for every fixed build if your Authentication Portal is exposed. The correct defensive order is mitigation first, patch second, verification third. If you do not use Authentication Portal, disable it. If you do use it, keep it reachable only from trusted internal paths and remove response-page exposure from untrusted interfaces.

For hosting networks, also check the systems behind the firewall after the edge is secured. A firewall compromise can create downstream risk for management jump boxes, domain controllers, backup systems, control panels, and customer workloads. The firewall patch is the start of the cleanup, not the entire cleanup.

Sources

Exit mobile version