📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global data_breach Education Technology CRITICAL 8h Global malware Financial Services CRITICAL 10h Global data_breach Technology / Cloud Services HIGH 11h Global phishing Mobile Applications / Consumer Technology HIGH 13h Global malware,apt,vulnerability Critical Infrastructure, Transportation, Aerospace HIGH 13h Global general Cybersecurity Operations HIGH 14h Global supply_chain Software Security CRITICAL 14h Global vulnerability Technology/Software HIGH 15h Global vulnerability Government CRITICAL 16h Global ransomware Education CRITICAL 16h Global data_breach Education Technology CRITICAL 8h Global malware Financial Services CRITICAL 10h Global data_breach Technology / Cloud Services HIGH 11h Global phishing Mobile Applications / Consumer Technology HIGH 13h Global malware,apt,vulnerability Critical Infrastructure, Transportation, Aerospace HIGH 13h Global general Cybersecurity Operations HIGH 14h Global supply_chain Software Security CRITICAL 14h Global vulnerability Technology/Software HIGH 15h Global vulnerability Government CRITICAL 16h Global ransomware Education CRITICAL 16h Global data_breach Education Technology CRITICAL 8h Global malware Financial Services CRITICAL 10h Global data_breach Technology / Cloud Services HIGH 11h Global phishing Mobile Applications / Consumer Technology HIGH 13h Global malware,apt,vulnerability Critical Infrastructure, Transportation, Aerospace HIGH 13h Global general Cybersecurity Operations HIGH 14h Global supply_chain Software Security CRITICAL 14h Global vulnerability Technology/Software HIGH 15h Global vulnerability Government CRITICAL 16h Global ransomware Education CRITICAL 16h
Vulnerabilities

CVE-2026-0300

Critical 🇺🇸 CISA KEV
Published: May 6, 2026  ·  Source: CISA_KEV
CVSS v3
9.8
🔗 NVD Official
📄 Description (English)

Palo Alto Networks PAN-OS — CVE-2026-0300
Palo Alto Networks PAN-OS contains an out-of-bounds write vulnerability in the User-ID Authentication Portal (aka Captive Portal) service that can allow an unauthenticated attacker to execute arbitrary code with root privileges on the PA-Series and VM-Series firewalls by sending specially crafted packets.

Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. Until the vendor releases an official fix, the following workaround should be implemented: - Restrict User-ID Authentication Portal access to only trusted zones. - Disable User-ID Authentication Portal if not required.
Due Date: 2026-05-09

🤖 AI Executive Summary

CVE-2026-0300 is a critical out-of-bounds write vulnerability in Palo Alto Networks PAN-OS User-ID Authentication Portal affecting PA-Series and VM-Series firewalls. Unauthenticated attackers can execute arbitrary code with root privileges by sending specially crafted packets. With a CVSS score of 9.8 and no patch currently available, this poses an immediate threat to organizations relying on Palo Alto firewalls for perimeter security.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: May 7, 2026 03:48
🇸🇦 Saudi Arabia Impact Assessment
This vulnerability poses critical risk to Saudi organizations across multiple sectors: Banking sector (SAMA-regulated institutions) relying on Palo Alto firewalls for payment system protection; Government agencies (NCA oversight) using these firewalls for critical infrastructure; Energy sector (ARAMCO and downstream) protecting SCADA/ICS networks; Telecom operators (STC, Mobily, Zain) securing network perimeters; Healthcare institutions protecting patient data; and Large enterprises in financial services. The ability to achieve root-level code execution on firewalls could enable complete network compromise, lateral movement, and data exfiltration. Organizations in Saudi Arabia with Palo Alto deployments face immediate risk of unauthorized access to sensitive networks and critical infrastructure.
🏢 Affected Saudi Sectors
Banking and Financial Services Government and Public Administration Energy and Utilities Telecommunications Healthcare Large Enterprises Critical Infrastructure
⚖️ Saudi Risk Score (AI)
9.7
/ 10.0
🔧 Remediation Steps (English)
IMMEDIATE ACTIONS:
1. Inventory all Palo Alto PA-Series and VM-Series firewalls in your environment and document their current PAN-OS versions
2. Disable User-ID Authentication Portal immediately if not operationally required
3. If User-ID Authentication Portal is required, restrict access to only trusted internal zones and implement network segmentation
4. Implement strict access controls limiting connectivity to the Captive Portal service to authorized networks only
5. Monitor firewall logs for suspicious authentication attempts and malformed packets targeting the User-ID service

DETECTION RULES:
- Alert on any unauthenticated connections to User-ID Authentication Portal service ports
- Monitor for malformed or oversized packets sent to Captive Portal endpoints
- Track failed authentication attempts and unusual packet patterns
- Log all User-ID service errors and crashes

COMPENSATING CONTROLS:
- Deploy network-based IDS/IPS rules to detect and block malformed packets targeting User-ID service
- Implement firewall rules to restrict User-ID portal access to specific trusted IP ranges
- Enable enhanced logging and SIEM integration for User-ID service events
- Consider deploying additional perimeter security appliances as defense-in-depth

PATCHING GUIDANCE:
- Monitor Palo Alto Networks security advisories daily for patch availability
- Establish expedited patching procedures for critical vulnerabilities
- Plan emergency maintenance windows for patch deployment once available
- Test patches in isolated lab environment before production deployment
- Coordinate with SAMA/NCA if operating critical financial or government infrastructure
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية:
1. قم بحصر جميع جدران حماية Palo Alto من سلسلة PA و VM في بيئتك وتوثيق إصدارات PAN-OS الحالية
2. قم بتعطيل بوابة المصادقة للمعرّفات فوراً إذا لم تكن مطلوبة تشغيلياً
3. إذا كانت بوابة المصادقة للمعرّفات مطلوبة، قيّد الوصول إلى المناطق الداخلية الموثوقة فقط وطبّق تقسيم الشبكة
4. طبّق ضوابط وصول صارمة تحد من الاتصال بخدمة بوابة المصادقة إلى الشبكات المصرح لها فقط
5. راقب سجلات جدار الحماية للكشف عن محاولات مصادقة مريبة وحزم غير صحيحة موجهة لخدمة المعرّفات

قواعد الكشف:
- تنبيهات على أي اتصالات غير مصرح بها بخدمة بوابة المصادقة للمعرّفات
- مراقبة الحزم غير الصحيحة أو الكبيرة المرسلة إلى نقاط نهاية بوابة المصادقة
- تتبع محاولات المصادقة الفاشلة والأنماط غير العادية للحزم
- تسجيل جميع أخطاء وأعطال خدمة المعرّفات

الضوابط البديلة:
- نشر قواعد IDS/IPS قائمة على الشبكة للكشف عن الحزم غير الصحيحة وحجبها الموجهة لخدمة المعرّفات
- تطبيق قواعد جدار الحماية لتقييد وصول بوابة المعرّفات إلى نطاقات IP موثوقة محددة
- تفعيل السجلات المحسّنة وتكامل SIEM لأحداث خدمة المعرّفات
- النظر في نشر أجهزة أمان محيط إضافية كدفاع متعدد الطبقات

إرشادات التصحيح:
- راقب استشارات أمان Palo Alto Networks يومياً لتوفر التصحيحات
- أنشئ إجراءات تصحيح معجلة للثغرات الحرجة
- خطط نوافذ صيانة طارئة لنشر التصحيحات بمجرد توفرها
- اختبر التصحيحات في بيئة معملية معزولة قبل نشرها في الإنتاج
- تنسيق مع SAMA/NCA إذا كنت تعمل بالبنية التحتية المالية أو الحكومية الحرجة
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC 2024 A.12.6.1 - Management of technical vulnerabilities ECC 2024 A.12.2.1 - Change management procedures ECC 2024 A.13.1.1 - Network security perimeter ECC 2024 A.14.2.1 - Security incident management
🔵 SAMA CSF
SAMA CSF ID.BE-1 - Asset management and inventory SAMA CSF PR.PT-2 - Protective technology deployment SAMA CSF DE.CM-1 - Detection and analysis SAMA CSF RS.MI-1 - Incident response and mitigation
🟡 ISO 27001:2022
ISO 27001:2022 A.12.3.1 - Configuration management ISO 27001:2022 A.12.6.1 - Management of technical vulnerabilities ISO 27001:2022 A.13.1.1 - Network security ISO 27001:2022 A.14.2.1 - Assessment and management of information security incidents
🟣 PCI DSS v4.0
PCI DSS 6.2 - Security patches and updates PCI DSS 11.2 - Vulnerability scanning PCI DSS 1.1 - Firewall configuration standards
🔗 References & Sources 0
No references.
📊 CVSS Score
9.8
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.8
EPSS14.90%
Exploit No
Patch ✗ No
CISA KEV🇺🇸 Yes
Published 2026-05-06
Source Feed cisa_kev
🇸🇦 Saudi Risk Score
9.7
/ 10.0 — Saudi Risk
Priority: CRITICAL
🏷️ Tags
kev cisa exploit-known
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.