Back to News
Cybersecurity

Critical PAN-OS Vulnerability Exposes Businesses to Remote Code Execution Threats

Palo Alto Networks warns of an actively exploited vulnerability in PAN-OS that allows unauthenticated remote code execution.

Palo Alto Networks has issued an urgent advisory regarding a severe buffer overflow vulnerability in its PAN-OS software, identified as CVE-2026-0300. This flaw, which allows for unauthenticated remote code execution, has been confirmed to be under active exploitation in the wild. The vulnerability carries a high CVSS score of 9.3, particularly when the User-ID Authentication Portal is accessible from the internet. This situation poses a significant risk to organizations utilizing the affected software, especially if they have not implemented appropriate security measures.

For businesses, this vulnerability underscores the critical importance of maintaining up-to-date security protocols and ensuring that access configurations are appropriately managed. Organizations should prioritize immediate patching of their PAN-OS installations and consider restricting internet access to sensitive portals to mitigate potential exploitation risks. This incident highlights the broader implications for cybersecurity and AI, as the exploitation of such vulnerabilities can lead to unauthorized data access, system compromise, and potential disruptions. As cyber threats continue to evolve, organizations must remain vigilant and proactive in their cybersecurity strategies to safeguard against similar vulnerabilities.

---

*Originally reported by [The Hacker News](https://thehackernews.com/2026/05/palo-alto-pan-os-flaw-under-active.html)*