Palo Alto Networks, US6974351057

Palo Alto Networks Stock (US6974351057): Zero-Day Flaw in Firewalls Triggers Security Concerns

08.05.2026 - 18:04:53 | ad-hoc-news.de

Palo Alto Networks is addressing a critical zero-day vulnerability in its PAN-OS firewall software that has been exploited by suspected state-sponsored hackers. The flaw affects PA and VM series firewalls and could allow unauthenticated remote code execution with root privileges. Patches are expected to start rolling out on May 13, 2026.

Palo Alto Networks, US6974351057
Palo Alto Networks, US6974351057

Palo Alto Networks is addressing a critical zero-day vulnerability in its PAN-OS firewall software that has been exploited by suspected state-sponsored hackers. The flaw, tracked as CVE-2026-0300, affects PA and VM series firewalls and could allow unauthenticated remote code execution with root privileges. The company is working on patches, with the first round expected to be released on May 13, 2026, and a second round estimated for May 28, 2026.

The vulnerability is a buffer overflow in the User-ID Authentication Portal (Captive Portal) service of PAN-OS software. It allows an unauthenticated attacker to execute malicious code with root privileges by sending specially crafted packets. Limited exploitation has been observed targeting Palo Alto Networks User-ID Authentication Portals that are exposed to untrusted IP addresses or the public internet. The company has not directly attributed the attack to a specific threat actor or country, but evidence points to China.

Palo Alto Networks has advised customers to restrict access to the User-ID Authentication Portal to trusted internal IP addresses or disable the feature entirely if not in use. Additional mitigation measures include disabling Response Pages in the Interface Management Profile for any Layer 3 interface where untrusted or internet traffic can ingress. Customers with Advanced Threat Prevention can block exploitation attempts by enabling Threat ID 510019 from Applications and Threats content version 9097-10022.

The Cybersecurity and Infrastructure Security Agency (CISA) has added the flaw to its Known Exploited Vulnerabilities catalog. Initial exploitation attempts against a PAN-OS device were traced back to April 9, 2026, but were unsuccessful. A week later, attackers successfully injected shellcode into the device. Post-exploitation activities included Active Directory enumeration and the deployment of additional payloads like EarthWorm and ReverseSocks5 against a second device on April 29, 2026. Both tools have been previously used by various China-nexus hacking groups.

Palo Alto Networks has emphasized that the flaw affects only PA and VM series firewalls configured to use the User-ID Authentication Portal. Prisma Access, Cloud NGFW, and Panorama appliances are not affected by CVE-2026-0300. The company remains committed to a transparent, security-first approach to protect its global customer base.

As of May 8, 2026, the stock traded at $450.00 on the NYSE, reflecting investor concerns over the security incident. The company's market capitalization stands at approximately $120 billion, underscoring its position as a leading cybersecurity provider. Palo Alto Networks continues to invest in research and development to enhance its security offerings and maintain customer trust.

Investors should monitor the company's progress in deploying patches and mitigating the vulnerability's impact. Palo Alto Networks' ability to respond swiftly and effectively to security threats will be crucial in maintaining its reputation and market position. The incident highlights the ongoing challenges in the cybersecurity landscape and the importance of proactive security measures.

For more information, visit the official Palo Alto Networks website and investor relations page. Stay informed about the latest developments and updates regarding the CVE-2026-0300 vulnerability and the company's response.

Disclaimer: This article does not constitute investment advice. Stocks are volatile financial instruments.

Media_Description: Palo Alto Networks firewall security flaw

Tags: Palo Alto Networks, cybersecurity, stock

ISIN: US6974351057

Summary:

Palo Alto Networks is addressing a critical zero-day vulnerability in its PAN-OS firewall software that has been exploited by suspected state-sponsored hackers. The flaw, CVE-2026-0300, affects PA and VM series firewalls and could allow unauthenticated remote code execution with root privileges. Patches are expected to start rolling out on May 13, 2026.

The vulnerability is a buffer overflow in the User-ID Authentication Portal service of PAN-OS software. Limited exploitation has been observed targeting devices exposed to untrusted IP addresses or the public internet. The company has advised customers to restrict access to the portal to trusted internal IP addresses or disable the feature entirely if not in use.

Palo Alto Networks has emphasized that the flaw affects only PA and VM series firewalls configured to use the User-ID Authentication Portal. Prisma Access, Cloud NGFW, and Panorama appliances are not affected. The company remains committed to a transparent, security-first approach to protect its global customer base.

Text:

Palo Alto Networks is addressing a critical zero-day vulnerability in its PAN-OS firewall software that has been exploited by suspected state-sponsored hackers. The flaw, tracked as CVE-2026-0300, affects PA and VM series firewalls and could allow unauthenticated remote code execution with root privileges. The company is working on patches, with the first round expected to be released on May 13, 2026, and a second round estimated for May 28, 2026.

The vulnerability is a buffer overflow in the User-ID Authentication Portal (Captive Portal) service of PAN-OS software. It allows an unauthenticated attacker to execute malicious code with root privileges by sending specially crafted packets. Limited exploitation has been observed targeting Palo Alto Networks User-ID Authentication Portals that are exposed to untrusted IP addresses or the public internet. The company has not directly attributed the attack to a specific threat actor or country, but evidence points to China.

Palo Alto Networks has advised customers to restrict access to the User-ID Authentication Portal to trusted internal IP addresses or disable the feature entirely if not in use. Additional mitigation measures include disabling Response Pages in the Interface Management Profile for any Layer 3 interface where untrusted or internet traffic can ingress. Customers with Advanced Threat Prevention can block exploitation attempts by enabling Threat ID 510019 from Applications and Threats content version 9097-10022.

The Cybersecurity and Infrastructure Security Agency (CISA) has added the flaw to its Known Exploited Vulnerabilities catalog. Initial exploitation attempts against a PAN-OS device were traced back to April 9, 2026, but were unsuccessful. A week later, attackers successfully injected shellcode into the device. Post-exploitation activities included Active Directory enumeration and the deployment of additional payloads like EarthWorm and ReverseSocks5 against a second device on April 29, 2026. Both tools have been previously used by various China-nexus hacking groups.

Palo Alto Networks has emphasized that the flaw affects only PA and VM series firewalls configured to use the User-ID Authentication Portal. Prisma Access, Cloud NGFW, and Panorama appliances are not affected by CVE-2026-0300. The company remains committed to a transparent, security-first approach to protect its global customer base.

As of May 8, 2026, the stock traded at $450.00 on the NYSE, reflecting investor concerns over the security incident. The company's market capitalization stands at approximately $120 billion, underscoring its position as a leading cybersecurity provider. Palo Alto Networks continues to invest in research and development to enhance its security offerings and maintain customer trust.

Investors should monitor the company's progress in deploying patches and mitigating the vulnerability's impact. Palo Alto Networks' ability to respond swiftly and effectively to security threats will be crucial in maintaining its reputation and market position. The incident highlights the ongoing challenges in the cybersecurity landscape and the importance of proactive security measures.

For more information, visit the official Palo Alto Networks website and investor relations page. Stay informed about the latest developments and updates regarding the CVE-2026-0300 vulnerability and the company's response.

Disclaimer: This article does not constitute investment advice. Stocks are volatile financial instruments.

So schätzen die Börsenprofis Palo Alto Networks Aktien ein!

<b>So schätzen die Börsenprofis  Palo Alto Networks Aktien ein!</b>
Seit 2005 liefert der Börsenbrief trading-notes verlässliche Anlage-Empfehlungen – dreimal pro Woche, direkt ins Postfach. 100% kostenlos. 100% Expertenwissen. Trage einfach deine E-Mail Adresse ein und verpasse ab heute keine Top-Chance mehr. Jetzt abonnieren.
Für. Immer. Kostenlos.
en | US6974351057 | PALO ALTO NETWORKS | boerse | 69294026 | bgmi