{"vulnerability": "CVE-2026-0300", "sightings": [{"uuid": "70812e88-edba-429c-9718-6e6c4bd2cb00", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0300", "type": "seen", "source": "https://bsky.app/profile/ripjyr.bsky.social/post/3ml5cayz3of2v", "content": "Paloalto\u306e\u8106\u5f31\u6027\u60c5\u5831 \u300cCVE-2026-0300 PAN-OS: Unauthenticated user initiated Buffer Overflow Vulnerability in User-ID\u2122 Authentication Portal (Severity: CRITICAL)\u300d\u304c\u516c\u958b\u3055\u308c\u307e\u3057\u305f\u3002\n\u2192 https://security.paloaltonetworks.com/CVE-2026-0300", "creation_timestamp": "2026-05-05T23:03:25.945852Z"}, {"uuid": "7a93ad46-0957-4a1d-9c80-b71623198d5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0300", "type": "seen", "source": "https://bsky.app/profile/hendryadrian.bsky.social/post/3ml5ypngizi22", "content": "Palo Alto Networks will release patches for CVE-2026-0300, a critical zero-day buffer overflow in User-ID Authentication Portal enabling unauthenticated root code execution on PA and VM firewalls. #ZeroDayExploit #FirewallPatch #USA", "creation_timestamp": "2026-05-06T05:45:19.517446Z"}, {"uuid": "215c56c5-864f-4a91-8b34-74e2930dba3c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2026-0300", "type": "seen", "source": "https://www.hkcert.org/security-bulletin/palo-alto-pan-os-remote-code-execution-vulnerability_20260506", "content": "", "creation_timestamp": "2026-05-05T18:00:00.000000Z"}, {"uuid": "dba2d77e-76c5-4785-9e57-979eddc9a2d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0300", "type": "seen", "source": "https://bsky.app/profile/undercode.bsky.social/post/3ml5ugihugn2c", "content": "PATCH NOW: Critical PAN-OS 0-Day (CVE-2026-0300) Grants FULL ROOT Access to Palo Alto Firewalls \u2013 No Password Required +\u00a0Video\n\nIntroduction: An unauthenticated buffer overflow in Palo Alto Networks\u2019 PAN-OS is being actively exploited in the wild, allowing attackers to achieve full root access on\u2026", "creation_timestamp": "2026-05-06T04:28:37.653271Z"}, {"uuid": "2d66f771-d10e-45c9-ad94-0e2be07cb990", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0300", "type": "seen", "source": "https://bsky.app/profile/fraustief.bsky.social/post/3ml635cak2k2e", "content": "\ud83d\udea8 Sicherheitsl\u00fccke CVE-2026-0300 in PAN-OS-Firewalls aktiv ausgenutzt.\n\n\u2139 Betroffen sind \u00f6ffentlich zug\u00e4ngliche User-ID-Portale,   mehrere Versionen. \u261d\ufe0f Fixes nicht vor dem 13. Mai 2026 erwartet\n\n \ud83e\ude79 Zugriff auf vertrauensw\u00fcrdige Zonen beschr\u00e4nken oder deaktivieren\n\nthehackernews.com/2026/05/palo...", "creation_timestamp": "2026-05-06T06:28:54.283459Z"}, {"uuid": "2343aeef-093d-4fbb-80f5-5c1ca800ae29", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0300", "type": "seen", "source": "https://bsky.app/profile/cerberusit.bsky.social/post/3ml64xdvcik2l", "content": "CVE-2026-0300 has turned Palo Alto\u2019s PAN-OS software into a lovely welcome mat for anyone who understands the Captive Portal service. This zero-day targets PA and VM series firewalls, proving that paying premium prices for hardware is just a way to fund more expensive patches l...\n\nRead full story", "creation_timestamp": "2026-05-06T07:01:12.689309Z"}, {"uuid": "5f943d3a-8f33-4214-82c9-0695e4a86439", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0300", "type": "seen", "source": "https://bsky.app/profile/securestep9.bsky.social/post/3ml667izvrs2i", "content": "#PaloAlto PAN-OS Vulnerability CVE-2026-0300 Under Active Exploitation - Enables Remote Code Execution (#RCE) - CVSS 9.3 no patch released yet, but expected soon!\n\ud83d\udc47\nthehackernews.com/2026/05/palo...", "creation_timestamp": "2026-05-06T07:23:38.824665Z"}, {"uuid": "5ae87f29-1858-4abd-921c-f35d9e00dbc5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0300", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/83009", "content": "\ud83d\udea8 GitHub \u76d1\u63a7\u6d88\u606f\u63d0\u9192\n\n\ud83d\udea8 \u53d1\u73b0\u5173\u952e\u8bcd\uff1a #CVE-2026\n\n\ud83d\udce6 \u9879\u76ee\u540d\u79f0\uff1a PAN-OS-User-ID-Buffer-Overflow-PoC\n\ud83d\udc64 \u9879\u76ee\u4f5c\u8005\uff1a qassam-315\n\ud83d\udee0 \u5f00\u53d1\u8bed\u8a00\uff1a Python\n\u2b50 Star\u6570\u91cf\uff1a 0  |  \ud83c\udf74 Fork\u6570\u91cf\uff1a 0\n\ud83d\udcc5 \u66f4\u65b0\u65f6\u95f4\uff1a 2026-05-06 04:54:23\n\n\ud83d\udcdd \u9879\u76ee\u63cf\u8ff0\uff1a\nA research-grade Proof-of-Concept (PoC) for CVE-2026-0300, targeting the Buffer Overflow vulnerability in Palo Alto Networks PAN-OS User-ID\u2122 Authentication Portal (CWE-787).\n\n\ud83d\udd17 \u70b9\u51fb\u8bbf\u95ee\u9879\u76ee\u5730\u5740", "creation_timestamp": "2026-05-06T05:00:05.000000Z"}, {"uuid": "3a0fc141-7a72-4bad-9cf8-d34c8562df81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0300", "type": "seen", "source": "https://t.me/CyberSecurityIL/84311", "content": "\u05e9\u05d9\u05de\u05d5 \u05dc\u05d1 \u05dc\u05d7\u05d5\u05dc\u05e9\u05d4 \u05e7\u05e8\u05d9\u05d8\u05d9\u05ea CVE-2026-0300 \u05d1\u05de\u05e2\u05e8\u05db\u05ea Pan-os \u05e9\u05dc \u05e4\u05d0\u05dc\u05d5 \u05d0\u05dc\u05d8\u05d5.\n\n\u05d4\u05d7\u05d5\u05dc\u05e9\u05d4 \u05de\u05e0\u05d5\u05e6\u05dc\u05ea \u05d1\u05e4\u05d5\u05e2\u05dc \u05e2\"\u05d9 \u05ea\u05d5\u05e7\u05e4\u05d9\u05dd.\n\n\u05e4\u05e8\u05d8\u05d9\u05dd \u05e0\u05d5\u05e1\u05e4\u05d9\u05dd \u05db\u05d0\u05df.\n\nhttps://t.me/CyberSecurityIL/8883", "creation_timestamp": "2026-05-06T06:52:07.000000Z"}, {"uuid": "8c9bd1b4-04d5-42fa-8df8-7d35a1e9d48a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0300", "type": "seen", "source": "https://bsky.app/profile/eyalestrin.bsky.social/post/3ml6bxpwuj22h", "content": "CVE-2026-0300 PAN-OS: Unauthenticated user initiated Buffer Overflow Vulnerability in User-ID\u2122 Authentication Portal #patchmanagement", "creation_timestamp": "2026-05-06T08:30:53.993524Z"}, {"uuid": "f9fbfa2f-bbbb-4847-af61-d1abca384c43", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0300", "type": "seen", "source": "https://thehackernews.com/2026/05/palo-alto-pan-os-flaw-under-active.html", "content": "Palo Alto Networks has released an advisory warning that a critical buffer overflow vulnerability in its PAN-OS software has been exploited in the wild.\nThe vulnerability, tracked as CVE-2026-0300, has been described as a case of unauthenticated remote code execution. It carries a CVSS score of 9.3 if the User-ID Authentication Portal is configured to enable access from the internet or any", "creation_timestamp": "2026-05-06T04:14:00.000000Z"}, {"uuid": "29a76fd4-1a03-4f94-9499-0a28abf8dca8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0300", "type": "seen", "source": "https://bsky.app/profile/infosecbot.bsky.social/post/3ml6eedco2w2v", "content": "Overnight watchTowr rapidly reacted to CVE-2026-0300, an unauthenticated buffer overflow in Palo Alto PAN-OS User-ID Auth Portal. RCE as root on PA-/VM-Series. No patch. Palo Alto: limited ITW exploitation. Existing\u2026\n\n\u2014 from @watchtowrcyber (https://x.com/watchtowrcyber/status/2051949440416559560)", "creation_timestamp": "2026-05-06T09:13:45.048371Z"}, {"uuid": "d14b2b6d-fd20-408b-b26d-7d180fb85501", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2026-0300", "type": "published-proof-of-concept", "source": "https://github.com/qassam-315/PAN-OS-User-ID-Buffer-Overflow-PoC", "content": "", "creation_timestamp": "2026-05-06T09:27:07.784156Z"}, {"uuid": "af13fbcd-7aa2-48c1-8f69-b11be5a2e6f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0300", "type": "seen", "source": "https://bsky.app/profile/securopean.bsky.social/post/3ml6gjn35mc2d", "content": "security.paloaltonetworks.com/CVE-2026-0300\n\nPaloalto", "creation_timestamp": "2026-05-06T09:52:32.057126Z"}, {"uuid": "c05eba83-48d6-4fe5-8db5-28e06b373345", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0300", "type": "seen", "source": "https://bsky.app/profile/helpnetsecurity.com/post/3ml6h3fkbt22k", "content": "Root-level RCE vulnerability in Palo Alto firewalls exploited (CVE-2026-0300)\n\n\ud83d\udcd6 Read more: www.helpnetsecurity.com/2026/05/06/p...\n\n#cybersecurity #cybersecuritynews #firewall #0day @paloaltonetworks.com", "creation_timestamp": "2026-05-06T10:02:30.418685Z"}, {"uuid": "33893a3c-648e-4caf-b6b2-38d1737f8f2a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0300", "type": "seen", "source": "https://bsky.app/profile/undercodenews.bsky.social/post/3ml6hag6eg22k", "content": "Critical PAN-OS Vulnerability CVE-2026-0300 Under Active Exploitation: Firewall Security at Risk +\u00a0Video\n\nIntroduction: A Silent Threat Targeting Core Network Defenses A newly disclosed vulnerability inside enterprise-grade firewall systems has quickly escalated into a serious cybersecurity\u2026", "creation_timestamp": "2026-05-06T10:05:15.323898Z"}, {"uuid": "f972cebc-dd5c-4687-b3c5-89c17eba96db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0300", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3ml6h5pokxv42", "content": "Palo Alto Networks PAN-OS flaw exploited for remote code execution Palo Alto Networks warns of a critical PAN-OS flaw (CVE-2026-0300) that is under active attack, allowing unauthenticated remote co...\n\n#Breaking #News #Hacking #Security #CVE-2026-0300 [\u2026] \n\n[Original post on securityaffairs.com]", "creation_timestamp": "2026-05-06T10:06:56.942688Z"}, {"uuid": "fa1a8aed-ecdb-4821-8807-ec86216e538b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0300", "type": "seen", "source": "https://bsky.app/profile/potato.software/post/3ml6hs4mhti2t", "content": "Critical PAN-OS Vulnerability CVE-2026-0300 Under Active Exploitation: Firewall Security at Risk +\u00a0Video\n\nIntroduction: A Silent Threat Targeting Core Network Defenses A newly disclosed vulnerability inside enterprise-grade firewall systems has quickly escalated into a serious potatosecurity\u2026", "creation_timestamp": "2026-05-06T10:15:08.926412Z"}, {"uuid": "a11dfb33-c2c5-4ae9-b873-444458472e8c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0300", "type": "seen", "source": "https://bsky.app/profile/securityrss.bsky.social/post/3ml6kkzljjf2q", "content": "Palo Alto Networks disclosed a critical buffer overflow vulnerability in PAN-OS, tracked as CVE-2026-0300, with a CVSS score of 9.3. It allows unauthenticated attackers to execute arbitrary code on PA-Series and VM-Series firewalls via the User-ID\u2122 Authentication Portal.", "creation_timestamp": "2026-05-06T11:04:52.530523Z"}, {"uuid": "4c5c754e-b622-4872-96ea-6b3bbdc6a37f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0300", "type": "seen", "source": "https://bsky.app/profile/pixelsandpulse.bsky.social/post/3ml6lavk23z2s", "content": "Heads up, network admins! Palo Alto Networks firewalls have a critical RCE zero-day (CVE-2026-0300) actively exploited, giving attackers root access. If your User-ID Portal is exposed, you're a target. Learn how to mitigate\u2026\n\nhttps://www.tpp.blog/2h5mqgt\n\n#cybersecurity #paloaltonetworks #panos", "creation_timestamp": "2026-05-06T11:17:05.988410Z"}, {"uuid": "37096ac2-3eac-43be-bf07-51765d91963b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0300", "type": "seen", "source": "https://bsky.app/profile/neroqc.bsky.social/post/3ml6tpmxvsc2b", "content": "Critical Buffer Overflow in Palo Alto Networks PAN-OS User-ID Authentication Portal (CVE-2026-0300)\nwww.rapid7.com/blog/post/et...", "creation_timestamp": "2026-05-06T13:48:34.306852Z"}, {"uuid": "557616da-1f2e-4c35-ad3f-68b7b92fa1e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0300", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/116527742576079365", "content": "Whoopsie\nhttps://security.paloaltonetworks.com/CVE-2026-0300", "creation_timestamp": "2026-05-06T12:57:24.501611Z"}, {"uuid": "34089f7c-28ac-4b62-9175-c823cda4dc3c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0300", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3ml6nenualvx2", "content": "PAN-OS Flaw CVE-2026-0300 Exposes Firewalls to Remote Code Execution A newly disclosed cybersecurity issue, tracked as CVE-2026-0300, has drawn urgent attention due to its critical severity and act...\n\n#Firewall #Daily #Cyber #News #Vulnerabilities [\u2026] \n\n[Original post on thecyberexpress.com]", "creation_timestamp": "2026-05-06T11:55:00.457476Z"}, {"uuid": "c1bcb115-1b60-4d45-9588-454bea469b22", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0300", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3ml6nwzn7rme2", "content": "Palo Alto Networks: Cyber Security News \u00ae\u2019s Post Critical Palo Alto Networks Vulnerability Exploited in the Wild (CVE-2026-0300) Palo Alto Networks has revealed a critical buffer overflow vulner...\n\n#cyber #Vulnerability\n\nOrigin | Interest | Match", "creation_timestamp": "2026-05-06T12:08:17.266299Z"}, {"uuid": "bf9634df-e1c7-4b1e-bbff-8f7e36e4485a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-0300", "type": "seen", "source": "https://bsky.app/profile/ahmandonk.bsky.social/post/3ml6oqj54w52v", "content": "\ud83d\udcf0 Palo Alto Networks Peringatkan Kerentanan 'Zero-Day' RCE Firewall Dieksploitasi dalam Serangan\n\n\ud83d\udc49 Baca artikel lengkap di sini: https://ahmandonk.com/2026/05/06/palo-alto-networks-peringatkan-kerentanan-zero-day-rce-firewall-dieksploitasi/\n\n#ahmandonkTechNews #beritaTeknologi #cve-2026-0300 ", "creation_timestamp": "2026-05-06T12:19:30.881714Z"}, {"uuid": "a24de405-7419-472c-9f5c-876c8e4c2e8b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0300", "type": "seen", "source": "https://bsky.app/profile/pigondrugs.bsky.social/post/3ml6pfpeezz26", "content": "~Certeu~\nA critical buffer overflow in PAN-OS User-ID Authentication Portal allows unauthenticated RCE as root.\n-\nIOCs: CVE-2026-0300\n-\n#CVE2026_0300 #PANOS #ThreatIntel", "creation_timestamp": "2026-05-06T12:31:22.694217Z"}, {"uuid": "2da95bd8-ec97-4fd9-8864-fd3c4ae1371c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0300", "type": "seen", "source": "Telegram/Dy1p3ib5zShURlv2rIfIT-2Ggs9supCHBfTq1hfZy0fVcQ", "content": "", "creation_timestamp": "2026-05-06T10:40:22.000000Z"}, {"uuid": "bc80b828-3b4b-4db3-b3ed-6cc5affec1fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0300", "type": "seen", "source": "https://bsky.app/profile/samilaiho.com/post/3ml6rpxsjas2s", "content": "security.paloaltonetworks.com/CVE-2026-0300", "creation_timestamp": "2026-05-06T13:12:55.543817Z"}, {"uuid": "7d665102-16fb-44a7-bbe1-26704adcce7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0300", "type": "seen", "source": "https://mastodon.social/ap/users/115426718704364579/statuses/116527808036769662", "content": "\ud83d\udcf0 Critical Palo Alto Networks Zero-Day (CVE-2026-0300) Actively Exploited for RCE\n\ud83d\udea8 CRITICAL ZERO-DAY: Palo Alto Networks warns of an unpatched, actively exploited RCE vulnerability (CVE-2026-0300) in PAN-OS firewalls. The flaw allows root access via the User-ID portal. Mitigate immediately! #CyberSecurity #ZeroDay #PANOS\n\ud83d\udd17 https://cyber.netsecops.io", "creation_timestamp": "2026-05-06T13:14:03.827339Z"}, {"uuid": "bc41f6c0-6610-4552-ad74-3350a469da95", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0300", "type": "seen", "source": "https://bsky.app/profile/netsecio.bsky.social/post/3ml6rsqta7h2u", "content": "\ud83d\udea8 CRITICAL ZERO-DAY: Palo Alto Networks warns of an unpatched, actively exploited RCE vulnerability (CVE-2026-0300) in PAN-OS firewalls. The flaw allows root access via the User-ID portal. Mitigate immediately! #CyberSecurity #ZeroDay #PANOS", "creation_timestamp": "2026-05-06T13:14:27.653900Z"}, {"uuid": "43fbf374-e84c-4cbd-bf32-2462d59dfd2c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-0300", "type": "seen", "source": "https://infosec.exchange/users/threatcodex/statuses/116527822333663271", "content": "CVE-2026-0300: Palo Alto PAN-OS Zero-Day Enables Root RCE on Exposed Firewalls#CVE_2026_0300 https://socprime.com/blog/latest-threats/cve-2026-0300-analysis/", "creation_timestamp": "2026-05-06T13:17:41.340668Z"}, {"uuid": "f3975596-e5be-464f-aa7b-d58263a4591a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2026-0300", "type": "seen", "source": "https://vulnerability.circl.lu/comment/5891d215-6f38-4734-8904-101fe25c4e26", "content": "", "creation_timestamp": "2026-05-06T12:47:13.228344Z"}, {"uuid": "bd752530-a393-47ba-9849-3071c76ed285", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0300", "type": "seen", "source": "https://bsky.app/profile/rapid7.com/post/3ml6u5o2bec2a", "content": "\ud83d\udea8 On 5/6/26, #PaloAltoNetworks published a security advisory for a critical vuln. affecting PAN-OS PA-Series &amp; VM-Series firewall appliances.\n\nCVE-2026-0300 carries a CVSSv4 score of 9.3 and has been confirmed as exploited in the wild by the vendor. More: r-7.co/48ML0Pf", "creation_timestamp": "2026-05-06T13:56:22.903047Z"}, {"uuid": "33039536-73a5-4e51-ae87-3ecbf2d969b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0300", "type": "seen", "source": "https://bsky.app/profile/ifin-intel.org/post/3ml6uacdcqa2b", "content": "This morning we decided to launch a \"Vulnerabilities\" category to track vulns without further actionable intelligence besides patching and monitoring. And wouldn't you know it, a crit on Palo Alto's User-ID portal showed up to ring it in!\n\ndiscourse.ifin.netwo...\n\n#CVE-2026-0300 #CVE #IFIN", "creation_timestamp": "2026-05-06T13:57:49.332623Z"}, {"uuid": "327e82c1-2c20-4322-8ab3-3d5f01e0ee50", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-0300", "type": "seen", "source": "https://infosec.exchange/ap/users/115741367687413652/statuses/116527980050877744", "content": "This morning we decided to launch a \"Vulnerabilities\" category to track vulns without further actionable intelligence besides patching and monitoring. And wouldn't you know it, a crit on Palo Alto's User-ID portal showed up to ring it in!\nhttps://discourse.ifin.network/t/cve-2026-0300-9-3-cvss-pan-os-unauthenticated-user-initiated-buffer-overflow-captive-portal/382\n#CVE-2026-0300 #CVE #IFIN", "creation_timestamp": "2026-05-06T13:59:10.958106Z"}, {"uuid": "01416a47-b167-4d1b-8a2d-4fbf825db466", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0300", "type": "seen", "source": "https://t.me/bdufstecru/3137", "content": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0441\u043b\u0443\u0436\u0431\u044b \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 User-ID \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b PAN-OS \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0437\u0430\u043f\u0438\u0441\u044c\u044e \u0437\u0430 \u0433\u0440\u0430\u043d\u0438\u0446\u0430\u043c\u0438 \u0431\u0443\u0444\u0435\u0440\u0430. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434 \u0441 \u043f\u0440\u0430\u0432\u0430\u043c\u0438 root \u043f\u0443\u0442\u0435\u043c \u043e\u0442\u043f\u0440\u0430\u0432\u043a\u0438 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u0444\u043e\u0440\u043c\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u043f\u0430\u043a\u0435\u0442\u043e\u0432\n\nBDU:2026-06322\nCVE-2026-0300\n\n\u041a\u043e\u043c\u043f\u0435\u043d\u0441\u0438\u0440\u0443\u044e\u0449\u0438\u0435 \u043c\u0435\u0440\u044b:\n- \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0430\u043b\u044c\u0442\u0435\u0440\u043d\u0430\u0442\u0438\u0432\u043d\u044b\u0445 \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c\u043e\u0432 \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438;\n- \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432 \u043c\u0435\u0436\u0441\u0435\u0442\u0435\u0432\u043e\u0433\u043e \u044d\u043a\u0440\u0430\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u0434\u043b\u044f \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u044f \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e\u0433\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u043c\u0443 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u043c\u0443 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044e;\n- \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u0435 \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u043c\u0443 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u043c\u0443 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044e, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0441\u0445\u0435\u043c\u0443 \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043f\u043e \u00ab\u0431\u0435\u043b\u044b\u043c \u0441\u043f\u0438\u0441\u043a\u0430\u043c\u00bb;\n- \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u044f \u0438 \u043f\u0440\u0435\u0434\u043e\u0442\u0432\u0440\u0430\u0449\u0435\u043d\u0438\u044f \u0432\u0442\u043e\u0440\u0436\u0435\u043d\u0438\u0439 \u0434\u043b\u044f \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u044f (\u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f, \u0440\u0435\u0433\u0438\u0441\u0442\u0440\u0430\u0446\u0438\u0438) \u0438 \u0440\u0435\u0430\u0433\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u043d\u0430 \u043f\u043e\u043f\u044b\u0442\u043a\u0438 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438;\n- \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u0435 \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u0438\u0437 \u0432\u043d\u0435\u0448\u043d\u0438\u0445 \u0441\u0435\u0442\u0435\u0439 (\u0418\u043d\u0442\u0435\u0440\u043d\u0435\u0442).", "creation_timestamp": "2026-05-06T15:27:49.000000Z"}, {"uuid": "b0b51164-85d8-4882-95d0-4fc52149560c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0300", "type": "seen", "source": "https://www.acn.gov.it/portale/w/palo-alto-pan-os-rilevato-sfruttamento-in-rete-della-cve-2026-0300", "content": "Rilevato lo sfruttamento attivo in rete della vulnerabilit\u00e0 CVE-2026-0300, che interessa Palo Alto PAN-OS. Tale vulnerabilit\u00e0, qualora sfruttata, potrebbe consentire ad un utente malintenzionato di eseguire codice arbitrario da remoto sui dispositivi interessati.", "creation_timestamp": "2026-05-06T08:41:59.000000Z"}, {"uuid": "2035e1f9-4f95-4cf9-aabf-beb12298a268", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0300", "type": "seen", "source": "https://bsky.app/profile/pigondrugs.bsky.social/post/3ml73amgz6y2k", "content": "~Cybergcca~\nCCCS released 3 advisories, highlighting an actively exploited critical vulnerability (CVE-2026-0300) in Palo Alto PAN-OS.\n-\nIOCs: CVE-2026-0300\n-\n#CVE2026_0300 #PaloAlto #ThreatIntel", "creation_timestamp": "2026-05-06T16:03:15.909423Z"}, {"uuid": "5a11b09a-fc4d-444b-86ee-ef0905c40c1b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0300", "type": "seen", "source": "https://infosec.exchange/users/AAKL/statuses/116528475250712788", "content": "Security Week: Palo Alto Networks to Patch Zero-Day Exploited to Hack Firewalls https://www.securityweek.com/palo-alto-networks-to-patch-zero-day-exploited-to-hack-firewalls/ @SecurityWeek \nPalo Alto posted this yesterday:\nCRITICAL: CVE-2026-0300 PAN-OS: Unauthenticated user initiated Buffer Overflow Vulnerability in User-ID\u2122 Authentication Portal https://security.paloaltonetworks.com/CVE-2026-0300 #PaloAlto #infosec #vulnerability #zeroday", "creation_timestamp": "2026-05-06T16:03:44.945854Z"}, {"uuid": "b6f9d62a-00c0-4a5c-b3a3-1e17ef280fb4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0300", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3ml73sh6nb7y2", "content": "Critical PAN-OS Flaw Under Active Exploitation Enables Remote Attacks A critical security vulnerability in Palo Alto Networks\u2019 PAN-OS software is being actively exploited by threat actors, the co...\n\n#Security #CVE-2026-0300 #cybersecurity #Palo #Alto #Networks #PAN-OS #vulnerability #remote [\u2026]", "creation_timestamp": "2026-05-06T16:13:18.673701Z"}, {"uuid": "256e4703-b59e-4bf8-a017-b1e5252720a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0300", "type": "seen", "source": "https://bsky.app/profile/todb2.hugesuccess.org/post/3ml74dtrdilf2", "content": "So this PAN-OS bug, CVE-2026-0300.\n\nIs there a good reason to expose this User-ID Authentication Portal to the internet in the first place? Yes yes, defend against insider threats and all that, but the opportunistic, across-the-ocean attack seems like it relies more on misconfiguration than [\u2026]", "creation_timestamp": "2026-05-06T16:23:00.425016Z"}, {"uuid": "4b13c7fd-b0ff-41b4-9579-032d5e34f6c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-0300", "type": "seen", "source": "https://bsky.app/profile/cyberveille-ch.bsky.social/post/3ml74r6vps622", "content": "\ud83d\udce2 Zero-day critique CVE-2026-0300 dans PAN-OS exploit\u00e9 contre des firewalls Palo Alto\n\ud83d\udcdd ## \ud83d\uddd3\ufe0f Contexte\n\nPubli\u00e9 le 6 mai 2026 par Eduard Kovacs sur \u2026\nhttps://cyberveille.ch/posts/2026-05-06-zero-day-critique-cve-2026-0300-dans-pan-os-exploite-contre-des-firewalls-palo-alto/ #CVE_2026_0300 #Cyberveille", "creation_timestamp": "2026-05-06T16:30:28.465188Z"}, {"uuid": "13ef615d-8232-4710-b1b2-3ceadf2a6305", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0300", "type": "seen", "source": "https://bsky.app/profile/o2cloud.bsky.social/post/3ml6wcyw4on2c", "content": "\ud83d\udd17 CVE : CVE-2026-0300, CVE-2026-0300", "creation_timestamp": "2026-05-06T14:35:07.320093Z"}, {"uuid": "147ec3ed-4526-4913-95cc-68172b30102a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0300", "type": "seen", "source": "https://t.me/true_secator/8176", "content": "Palo Alto Networks \u043f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0436\u0434\u0430\u0435\u0442 \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u0432 \u043e \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0439, \u0434\u043e \u043d\u0430\u0441\u0442\u043e\u044f\u0449\u0435\u0433\u043e \u0432\u0440\u0435\u043c\u0435\u043d\u0438 \u043d\u0435\u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u043f\u043e\u0440\u0442\u0430\u043b\u0435 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 PAN-OS, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u043f\u0440\u0438 \u044d\u0442\u043e\u043c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f \u0432 \u0430\u0442\u0430\u043a\u0430\u0445.\n\nUser-ID Authentication Portal, \u0442\u0430\u043a\u0436\u0435 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u044b\u0439 \u043a\u0430\u043a Captive Portal, \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0438\u0432\u0430\u0435\u0442 \u0444\u0443\u043d\u043a\u0446\u0438\u044e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 PAN-OS, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u0443\u0435\u0442 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439, \u0447\u044c\u0438 \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u043d\u0435 \u043c\u043e\u0433\u0443\u0442 \u0431\u044b\u0442\u044c \u0430\u0432\u0442\u043e\u043c\u0430\u0442\u0438\u0447\u0435\u0441\u043a\u0438 \u0441\u043e\u043f\u043e\u0441\u0442\u0430\u0432\u043b\u0435\u043d\u044b \u043c\u0435\u0436\u0441\u0435\u0442\u0435\u0432\u044b\u043c \u044d\u043a\u0440\u0430\u043d\u043e\u043c.\n\n\u0423\u043f\u043e\u043c\u044f\u043d\u0443\u0442\u0430\u044f 0-day, CVE-2026-0300, \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435\u043c \u0431\u0443\u0444\u0435\u0440\u0430 \u0438 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043d\u0435\u0430\u0432\u0442\u043e\u0440\u0438\u0437\u043e\u0432\u0430\u043d\u043d\u044b\u043c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434 \u0441 \u043f\u0440\u0430\u0432\u0430\u043c\u0438 root \u043d\u0430 \u043c\u0435\u0436\u0441\u0435\u0442\u0435\u0432\u044b\u0445 \u044d\u043a\u0440\u0430\u043d\u0430\u0445 PA-Series \u0438 VM-Series, \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b\u0445 \u0438\u0437 \u0418\u043d\u0442\u0435\u0440\u043d\u0435\u0442\u0430, \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u0444\u043e\u0440\u043c\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u043f\u0430\u043a\u0435\u0442\u043e\u0432.\n\n\u0421\u043e\u0433\u043b\u0430\u0441\u043d\u043e \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u044e Palo Alto Networks, \u0437\u0430\u0444\u0438\u043a\u0441\u0438\u0440\u043e\u0432\u0430\u043d\u044b \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u043d\u044b\u0435 \u0441\u043b\u0443\u0447\u0430\u0438 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 \u043f\u043e\u0440\u0442\u0430\u043b\u0430\u0445 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 Palo Alto Networks User-ID, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442 \u043d\u0435\u043d\u0430\u0434\u0435\u0436\u043d\u044b\u0435 IP-\u0430\u0434\u0440\u0435\u0441\u0430 \u0438/\u0438\u043b\u0438 \u043e\u0431\u0449\u0435\u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b\u0439 \u0438\u043d\u0442\u0435\u0440\u043d\u0435\u0442.\n\n\u041a\u043b\u0438\u0435\u043d\u0442\u044b, \u0441\u043e\u0431\u043b\u044e\u0434\u0430\u044e\u0449\u0438\u0435 \u0441\u0442\u0430\u043d\u0434\u0430\u0440\u0442\u043d\u044b\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u043f\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, \u0442\u0430\u043a\u0438\u0435 \u043a\u0430\u043a \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u0435 \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u043c \u043f\u043e\u0440\u0442\u0430\u043b\u0430\u043c \u0442\u043e\u043b\u044c\u043a\u043e \u0434\u043b\u044f \u0434\u043e\u0432\u0435\u0440\u0435\u043d\u043d\u044b\u0445 \u0432\u043d\u0443\u0442\u0440\u0435\u043d\u043d\u0438\u0445 \u0441\u0435\u0442\u0435\u0439, \u043d\u0435 \u043f\u043e\u0434\u0432\u0435\u0440\u0433\u0430\u044e\u0442\u0441\u044f \u0437\u043d\u0430\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u043c\u0443 \u0440\u0438\u0441\u043a\u0443.\n\n\u0412 \u043d\u0430\u0441\u0442\u043e\u044f\u0449\u0438\u0439 \u043c\u043e\u043c\u0435\u043d\u0442 Shadowserver \u0444\u0438\u043a\u0441\u0438\u0440\u0443\u0435\u0442\u00a0\u0431\u043e\u043b\u0435\u0435 5800 \u043c\u0435\u0436\u0441\u0435\u0442\u0435\u0432\u044b\u0445 \u044d\u043a\u0440\u0430\u043d\u043e\u0432 \u0441\u0435\u0440\u0438\u0438 PAN-OS VM \u0432 \u0433\u043b\u043e\u0431\u0430\u043b\u044c\u043d\u043e\u0439 \u0441\u0435\u0442\u0438, \u0431\u043e\u043b\u044c\u0448\u0438\u043d\u0441\u0442\u0432\u043e \u0438\u0437 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0440\u0430\u0441\u043f\u043e\u043b\u043e\u0436\u0435\u043d\u044b \u0432 \u0410\u0437\u0438\u0438 (2466) \u0438 \u0421\u0435\u0432\u0435\u0440\u043d\u043e\u0439 \u0410\u043c\u0435\u0440\u0438\u043a\u0435 (1998).\n\nPalo Alto Networks \u0442\u0430\u043a\u0436\u0435 \u043f\u0440\u0438\u0441\u0432\u043e\u0438\u043b\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043d\u0430\u0438\u0432\u044b\u0441\u0448\u0443\u044e \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u0443\u044e \u0441\u0442\u0435\u043f\u0435\u043d\u044c \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0441\u0442\u0438 \u0438 \u0440\u0430\u0431\u043e\u0442\u0430\u0435\u0442 \u043d\u0430\u0434 \u0435\u0435 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0435\u043c.\n\n\u0414\u043e \u043f\u043e\u044f\u0432\u043b\u0435\u043d\u0438\u044f \u043f\u0430\u0442\u0447\u0430 \u043d\u0430\u0441\u0442\u043e\u044f\u0442\u0435\u043b\u044c\u043d\u043e \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442 \u043a\u043b\u0438\u0435\u043d\u0442\u0430\u043c \u0437\u0430\u0449\u0438\u0442\u0438\u0442\u044c \u043f\u043e\u0440\u0442\u0430\u043b \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439, \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0438\u0432 \u0434\u043e\u0441\u0442\u0443\u043f \u0442\u043e\u043b\u044c\u043a\u043e \u043a \u0434\u043e\u0432\u0435\u0440\u0435\u043d\u043d\u044b\u043c \u0437\u043e\u043d\u0430\u043c \u0438\u043b\u0438 \u043e\u0442\u043a\u043b\u044e\u0447\u0438\u0432 \u043f\u043e\u0440\u0442\u0430\u043b, \u0435\u0441\u043b\u0438 \u044d\u0442\u043e \u043d\u0435\u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e.\n\n\u0421\u0442\u043e\u0438\u0442 \u043e\u0442\u043c\u0435\u0442\u0438\u0442\u044c, \u0447\u0442\u043e \u043c\u0435\u0436\u0441\u0435\u0442\u0435\u0432\u044b\u0435 \u044d\u043a\u0440\u0430\u043d\u044b PAN-OS \u0447\u0430\u0441\u0442\u043e \u0441\u0442\u0430\u043d\u043e\u0432\u0438\u043b\u0438\u0441\u044c \u043c\u0438\u0448\u0435\u043d\u044c\u044e \u0430\u0442\u0430\u043a, \u0437\u0430\u0447\u0430\u0441\u0442\u0443\u044e \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c 0-day.\n\n\u041a\u0430\u043a \u043d\u0430\u043f\u0440\u0438\u043c\u0435\u0440, \u0432 \u043d\u043e\u044f\u0431\u0440\u0435 2024 \u0433\u043e\u0434\u0430, \u043a\u043e\u0433\u0434\u0430 Shadowserver \u0441\u043e\u043e\u0431\u0449\u0430\u043b\u0430 \u043e\u00a0\u0432\u0437\u043b\u043e\u043c\u0435 \u0442\u044b\u0441\u044f\u0447 \u043c\u0435\u0436\u0441\u0435\u0442\u0435\u0432\u044b\u0445 \u044d\u043a\u0440\u0430\u043d\u043e\u0432\u00a0(\u043a\u043e\u043c\u043f\u0430\u043d\u0438\u044f \u0437\u0430\u044f\u0432\u0438\u043b\u0430, \u0447\u0442\u043e \u0430\u0442\u0430\u043a\u0438 \u0437\u0430\u0442\u0440\u043e\u043d\u0443\u043b\u0438 \u043b\u0438\u0448\u044c \u00ab\u043e\u0447\u0435\u043d\u044c \u043d\u0435\u0431\u043e\u043b\u044c\u0448\u043e\u0435 \u043a\u043e\u043b\u0438\u0447\u0435\u0441\u0442\u0432\u043e \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u00bb) \u0432 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0435 \u0430\u0442\u0430\u043a \u0441\u00a0\u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u0434\u0432\u0443\u0445 0-day \u0432 \u043c\u0435\u0436\u0441\u0435\u0442\u0435\u0432\u044b\u0445 \u044d\u043a\u0440\u0430\u043d\u0430\u0445 PAN-OS.\n\n\u0422\u043e\u0433\u0434\u0430 \u043c\u0435\u0441\u044f\u0446 \u0441\u043f\u0443\u0441\u0442\u044f Palo Alto Networks \u043f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0434\u0438\u043b\u0430, \u0447\u0442\u043e\u00a0\u0445\u0430\u043a\u0435\u0440\u044b \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442 \u0435\u0449\u0435 \u043e\u0434\u043d\u0443 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c DoS \u0432 PAN-OS\u00a0\u0434\u043b\u044f \u0430\u0442\u0430\u043a\u0438 \u043d\u0430 \u043c\u0435\u0436\u0441\u0435\u0442\u0435\u0432\u044b\u0435 \u044d\u043a\u0440\u0430\u043d\u044b \u0441\u0435\u0440\u0438\u0439 PA, VM \u0438 CN, \u0432\u044b\u043d\u0443\u0436\u0434\u0430\u044f \u0438\u0445 \u043f\u0435\u0440\u0435\u0437\u0430\u0433\u0440\u0443\u0436\u0430\u0442\u044c \u0438 \u043e\u0442\u043a\u043b\u044e\u0447\u0430\u0442\u044c \u0437\u0430\u0449\u0438\u0442\u0443 \u043c\u0435\u0436\u0441\u0435\u0442\u0435\u0432\u043e\u0433\u043e \u044d\u043a\u0440\u0430\u043d\u0430.\n\n\u0412\u0441\u043a\u043e\u0440\u0435 \u043f\u043e\u0441\u043b\u0435 \u044d\u0442\u043e\u0433\u043e, \u0432 \u0444\u0435\u0432\u0440\u0430\u043b\u0435, \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u043f\u0435\u0440\u0435\u043a\u043b\u044e\u0447\u0438\u043b\u0438\u0441\u044c \u043d\u0430\u00a0\u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0442\u0440\u0435\u0445 \u0434\u0440\u0443\u0433\u0438\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 PAN-OS\u00a0\u0434\u043b\u044f \u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0430\u0446\u0438\u0438 \u043c\u0435\u0436\u0441\u0435\u0442\u0435\u0432\u044b\u0445 \u044d\u043a\u0440\u0430\u043d\u043e\u0432 Palo Alto Networks \u0441 \u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441\u0430\u043c\u0438 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f, \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b\u043c\u0438 \u0438\u0437 \u0438\u043d\u0442\u0435\u0440\u043d\u0435\u0442\u0430.\n\n\u0412\u043f\u0440\u043e\u0447\u0435\u043c, \u043d\u0435\u0443\u0434\u0438\u0432\u0438\u0442\u0435\u043b\u044c\u043d\u043e, \u0432\u0435\u0434\u044c \u0441\u0440\u0435\u0434\u0438 \u043b\u044e\u0431\u0438\u0442\u0435\u043b\u0435\u0439 PAN-OS\u2019\u0430 \u0431\u043e\u043b\u0435\u0435 70 000 \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u0432 \u043f\u043e \u0432\u0441\u0435\u043c\u0443 \u043c\u0438\u0440\u0443, \u0432\u043a\u043b\u044e\u0447\u0430\u044f 90% \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0439 \u0438\u0437 \u0441\u043f\u0438\u0441\u043a\u0430 Fortune 10 \u0438 \u0431\u043e\u043b\u044c\u0448\u0438\u043d\u0441\u0442\u0432\u043e \u043a\u0440\u0443\u043f\u043d\u0435\u0439\u0448\u0438\u0445 \u0431\u0430\u043d\u043a\u043e\u0432 \u0421\u0428\u0410.", "creation_timestamp": "2026-05-06T13:39:09.000000Z"}, {"uuid": "f5b3e5f1-6696-4294-b5b3-d1770a1115c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0300", "type": "seen", "source": "https://t.me/GithubRedTeam/83064", "content": "\ud83d\udea8 GitHub \u76d1\u63a7\u6d88\u606f\u63d0\u9192\n\n\ud83d\udea8 \u53d1\u73b0\u5173\u952e\u8bcd\uff1a #CVE-2026\n\n\ud83d\udce6 \u9879\u76ee\u540d\u79f0\uff1a cve-2026-0300-audit\n\ud83d\udc64 \u9879\u76ee\u4f5c\u8005\uff1a TailwindRG\n\ud83d\udee0 \u5f00\u53d1\u8bed\u8a00\uff1a Python\n\u2b50 Star\u6570\u91cf\uff1a 0  |  \ud83c\udf74 Fork\u6570\u91cf\uff1a 0\n\ud83d\udcc5 \u66f4\u65b0\u65f6\u95f4\uff1a 2026-05-06 13:52:53\n\n\ud83d\udcdd \u9879\u76ee\u63cf\u8ff0\uff1a\nRead-only audit tooling for CVE-2026-0300 (PAN-OS User-ID Authentication Portal exposure)\n\n\ud83d\udd17 \u70b9\u51fb\u8bbf\u95ee\u9879\u76ee\u5730\u5740", "creation_timestamp": "2026-05-06T14:00:05.000000Z"}, {"uuid": "9c49a342-eee4-4808-9a69-7f35cf83cd38", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0300", "type": "seen", "source": "https://bsky.app/profile/clubic-off.bsky.social/post/3ml6xuzmvon27", "content": "Palo Alto alerte sur une faille critique CVE-2026-0300 exploit\u00e9e sur ses pare-feu PAN-OS. Elle permet une ex\u00e9cution de code \u00e0 distance avec droits root. Les correctifs tardent, les admin doivent limiter l'acc\u00e8s au portail User-ID. \ud83d\udee1\ufe0f\u26a0\ufe0f\u23f3", "creation_timestamp": "2026-05-06T15:03:06.215152Z"}, {"uuid": "eb09f510-ccde-49bb-86a9-e584078bb53f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-0300", "type": "seen", "source": "https://infosec.exchange/users/technadu/statuses/116528253328520061", "content": "PAN-OS zero-day (CVE-2026-0300) exploited.\u2022 Unauth RCE (root)\u2022 Targets exposed portals\u2022 Patches start May 13\nhttps://www.technadu.com/palo-alto-networks-to-patch-exploited-pan-os-zero-day-cve-2026-0300-starting-may-13/627358/\nAre you mitigating now?#InfoSec #CyberSecurity #ZeroDay", "creation_timestamp": "2026-05-06T15:07:18.634408Z"}, {"uuid": "b4cf989f-176a-405e-a3f4-231e72a1f22a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0300", "type": "seen", "source": "https://t.me/information_security_channel/55220", "content": "Palo Alto Networks to Patch Zero-Day Exploited to Hack Firewalls\nhttps://www.securityweek.com/palo-alto-networks-to-patch-zero-day-exploited-to-hack-firewalls/\n\nCVE-2026-0300 affects the Captive Portal service of PAN-OS software on PA and VM series firewalls.\nThe post Palo Alto Networks to Patch Zero-Day Exploited to Hack Firewalls (https://www.securityweek.com/palo-alto-networks-to-patch-zero-day-exploited-to-hack-firewalls/) appeared first on SecurityWeek (https://www.securityweek.com/).", "creation_timestamp": "2026-05-06T05:52:48.000000Z"}, {"uuid": "1576d7c1-6ee2-4e1b-a5f9-28e657d6a262", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2026-0300", "type": "seen", "source": "https://www.cert.se/2026/05/kritisk-sarbarhet-i-pan-os.html", "content": "", "creation_timestamp": "2026-05-06T06:20:00.000000Z"}, {"uuid": "0af1d2f7-44c3-4e66-b2c1-7efeb00741f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2026-0300", "type": "seen", "source": "https://cyber.gc.ca/en/alerts-advisories/palo-alto-networks-security-advisory-av26-425", "content": "", "creation_timestamp": "2026-05-06T06:31:14.000000Z"}, {"uuid": "ec55a164-486d-46a5-9dc7-feca84e3c4ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0300", "type": "seen", "source": "https://bsky.app/profile/thedailytechfeed.com/post/3ml7biiv2rc2c", "content": "Critical vulnerability CVE-2026-0300 in Palo Alto Networks firewalls exploited to gain root access. Immediate patching and mitigation required. #CyberSecurity #PaloAltoNetworks #Vulnerability Link: thedailytechfeed.com/critical-fla...", "creation_timestamp": "2026-05-06T17:55:04.330791Z"}, {"uuid": "7623b2f8-4d17-487f-a4ec-e17f43f38a37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0300", "type": "seen", "source": "https://bsky.app/profile/cvesentinel.bsky.social/post/3ml7bimvm3j2q", "content": "\ud83d\uded1 CVE-2026-0300\nPalo Alto Networks PAN-OS\nKEV\nTL;DR: Palo Alto Networks PAN-OS contains an out-of-bounds write vulnerability in the User-ID Authentication\u2026\nhttps://cvesentinel.replit.app/report/CVE-2026-0300?utm_source=bluesky&amp;utm_medium=social&amp;utm_campaign=cvesentinel\n#infosec #CVE #vulnerability", "creation_timestamp": "2026-05-06T17:55:07.193931Z"}, {"uuid": "c460557d-b049-408b-a602-351e84049ed3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0300", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/6424740", "content": "2026-05-06: [CVE-2026-0300] Palo Alto Networks PAN-OS Out-of-bounds Write VulnerabilityPalo Alto Networks PAN-OS contains an out-of-bounds write vulnerability in the User-ID Authentication Portal (aka Captive Portal) service that can allow an unauthenticated attacker to execute arbitrary code with root privileges on the PA-Series and VM-Series firewalls by sending specially crafted packets.\ncisakev", "creation_timestamp": "2026-05-06T19:11:49.961107Z"}, {"uuid": "4baec1d6-3ce3-4967-a9e7-3fed438f4956", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0300", "type": "seen", "source": "https://bsky.app/profile/r-blueteamsec.bsky.social/post/3ml7dy25lmo2b", "content": "CVE-2026-0300 PAN-OS: Unauthenticated user initiated Buffer Overflow Vulnerability in User-ID\u2122 Authentication Portal", "creation_timestamp": "2026-05-06T18:39:32.190954Z"}, {"uuid": "9bd13600-cd3b-4a92-8b5e-039582f48b54", "vulnerability_lookup_origin": "405284c2-e461-4670-8979-7fd2c9755a60", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2026-0300", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/528df847-2140-4049-8a49-1cf9f2ccf428", "content": "", "creation_timestamp": "2026-05-06T19:00:01.952524Z"}, {"uuid": "60dbb9ee-4039-44e1-b0b8-11219c0f5a5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-0300", "type": "seen", "source": "https://infosec.exchange/users/AAKL/statuses/116529178525202015", "content": "CISA has updated the KEV catalogue.\n-  CVE-2026-0300: Palo Alto Networks PAN-OS Out-of-bounds Write Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-0300 #infosec #CISA #PaloAlton #vulnerability", "creation_timestamp": "2026-05-06T19:02:35.612716Z"}]}