Skip to Content

Palo Alto Networks Rushes Patch for Firewall Zero-Day Under Active Attack

CVE-2026-0300 in PAN-OS Captive Portal is being actively exploited, prompting an emergency patch and exposure warnings for enterprise networks.

Palo Alto Networks is preparing an emergency patch for a zero-day vulnerability in its PAN-OS firewall software that threat actors are already exploiting in the wild. The flaw, tracked as CVE-2026-0300, affects the Captive Portal service running on both physical PA series and virtual VM series firewalls.

The vulnerability allows attackers to bypass authentication and gain unauthorized access to firewall management interfaces. Security researchers note that because Captive Portal is commonly exposed to untrusted networks for guest Wi-Fi access and device enrollment, the attack surface is broad across enterprises, universities, and healthcare organizations. A successful compromise at this layer can give adversaries persistent visibility into traffic flows and policy configurations.

Palo Alto Networks confirmed active exploitation after observing incidents in customer environments. The company plans to release a patch through its standard update channels and has advised administrators to apply the fix immediately once available. In the interim, security teams are being urged to restrict Captive Portal exposure to trusted IP ranges where possible and to monitor authentication logs for anomalous access patterns.

This incident arrives amid a broader trend of network security appliances being targeted directly by advanced persistent threat groups. Firewalls and VPN concentrators have become high-value targets because compromising them often grants deep visibility into internal traffic and creates opportunities for lateral movement. Recent campaigns have demonstrated that attackers increasingly prefer to burrow into the infrastructure meant to stop them.

Organizations running affected devices should treat this as a priority patching event. Delaying updates on perimeter security equipment raises the risk of full network compromise, particularly when proof-of-concept exploitation is already occurring.

Why it matters

When the security appliance designed to protect your network becomes the primary entry point, the entire defensive architecture is inverted. Organizations relying on Palo Alto firewalls should audit their Captive Portal exposure immediately and enforce strict access restrictions ahead of the patch. More broadly, the incident reinforces why zero-trust segmentation inside the perimeter remains essential. No single gateway device should be treated as an impenetrable barrier, and defense-in-depth strategies must assume that perimeter controls can and will fail.

Silicon Valley Bets $200 Million on Floating AI Data Centers in the Ocean
Panthalassa is building wave-powered floating nodes that generate electricity, cool AI chips with seawater, and transmit results via satellite.