This is most urgent for organisations using Palo Alto PAN-OS directly or through an IT provider.
Executive Summary
A critical Palo Alto Networks PAN-OS vulnerability, CVE-2026-0300, is being actively exploited against exposed User-ID Authentication Portals. This will not affect every small organisation, but it is serious for any organisation using Palo Alto firewalls directly or through an IT provider. The practical action today is simple: find out whether you use Palo Alto PAN-OS, whether the affected portal is exposed to the internet, and whether mitigations or patches are in place.
Situation
Palo Alto Networks has published an advisory for CVE-2026-0300, a buffer overflow vulnerability in the User-ID Authentication Portal, also known as Captive Portal, in PAN-OS. The advisory says exploitation has been observed and the vulnerability could allow an unauthenticated attacker to execute code with root privileges on affected PA-Series and VM-Series firewalls. Palo Alto also says the risk is greatly reduced where access to the portal is restricted to trusted internal IP addresses, and that Prisma Access, Cloud NGFW and Panorama appliances are not impacted.
Who should care
- Small organisations that use Palo Alto firewalls.
- Organisations that outsource firewall or network management to an IT provider or MSP.
- Organisations with remote access, firewall portals or authentication services exposed to the internet.
- Organisations that do not know what firewall technology protects them.
Why it matters
Firewalls are high-value security devices. If an internet-facing firewall portal is vulnerable and actively exploited, it may give attackers a route into systems that the organisation assumes are protected.
Actions On
- Ask your IT provider whether you use Palo Alto PAN-OS anywhere.
- Ask whether the User-ID Authentication Portal / Captive Portal is enabled.
- Ask whether any affected portal is exposed to the internet or untrusted IP addresses.
- Ask whether access has been restricted to trusted internal IP addresses.
- Ask whether the vendor advisory has been checked against your exact PAN-OS versions.
- Ask when patches or mitigations will be applied.
- Record the answer in your Cyber Stand-To log.
- If the answer is unclear, escalate to the business owner, trustee, director or senior manager responsible for IT risk.
Question to ask your IT provider
After-action review
- Do we know which firewall protects our organisation?
- Do we know who is responsible for firewall patching?
- Do we have a list of internet-facing systems?
- Can our IT provider confirm urgent vulnerability actions quickly?
- Is this type of issue covered in our incident response plan?
Sources
- Palo Alto Networks advisory for CVE-2026-0300
- NHS England cyber alert on CVE-2026-0300
- NCSC guidance for small and medium-sized organisations
- NCSC advice on preparing for vulnerability patch waves
LinkedIn post draft
Daily Int Brief — Actions On Cyber
A critical Palo Alto Networks PAN-OS vulnerability, CVE-2026-0300, is being actively exploited against exposed User-ID Authentication Portals.
Small organisations do not need the exploit details. They need one clear question for their IT provider:
“Do we use Palo Alto PAN-OS anywhere, and if so, is the User-ID Authentication Portal exposed to the internet? Has CVE-2026-0300 been mitigated or patched?”
No jargon. No panic. Just actions on.