Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical PAN-OS Flaw Exploited for Root Access

Critical PAN-OS Flaw Exploited for Root Access

Posted on May 7, 2026 By CWS

Palo Alto Networks has revealed new insights into a critical security vulnerability within its PAN-OS software that has been targeted by cyber attackers. First identified on April 9, 2026, these malicious actors attempted to exploit the flaw, known as CVE-2026-0300, which carries a high CVSS score of 9.3/8.7. This buffer overflow vulnerability in the User-ID Authentication Portal service allows attackers to execute arbitrary code with root privileges through specially crafted packets.

Details of the Vulnerability

The vulnerability’s critical nature stems from its potential to grant unauthenticated remote code execution (RCE) capabilities. Although Palo Alto Networks plans to release patches starting May 13, 2026, it urges users to preemptively secure their systems by limiting access to trusted zones or disabling the portal service if unnecessary.

The company is actively monitoring exploit attempts, attributed to a threat cluster labeled CL-STA-1132, suspected to be state-sponsored. These actors successfully leveraged the flaw to inject shellcode into the nginx worker process of PAN-OS software.

Exploitation and Countermeasures

Initial exploitation attempts were observed on April 9, with attackers achieving remote code execution one week later. Once access was gained, the attackers took measures to conceal their activities, including erasing kernel crash messages and nginx crash logs.

Subsequent actions involved Active Directory enumeration and deploying additional payloads such as EarthWorm and ReverseSocks5 on another device by April 29. These tools are often associated with hacking groups linked to China.

Broader Implications and Recommendations

Over recent years, state-sponsored cyber espionage has increasingly targeted edge-network technologies like firewalls and routers, which often lack robust security measures compared to traditional endpoints. Attackers, such as those behind CL-STA-1132, favor open-source tools for their low detectability and ease of integration into compromised environments.

Palo Alto Networks advises organizations to strengthen their perimeter defenses and remain vigilant for any unusual activities. The deployment of patches and adherence to best security practices are crucial in mitigating risks associated with this vulnerability.

In light of these developments, businesses are encouraged to review their network security strategies to ensure adequate protection against evolving cyber threats.

The Hacker News Tags:Active Directory, Advisory, buffer overflow, cyber espionage, Cybersecurity, network security, open-source tools, Palo Alto Networks, PAN-OS, remote code execution, security flaw, state-sponsored attackers, Vulnerability

Post navigation

Previous Post: Critical Redis Flaws Expose Systems to Remote Attacks
Next Post: Chrome 148 Launches with Key Security Enhancements

Related Posts

Brazil Hit by Banking Trojan Spread via WhatsApp Worm and RelayNFC NFC Relay Fraud Brazil Hit by Banking Trojan Spread via WhatsApp Worm and RelayNFC NFC Relay Fraud The Hacker News
Google Warns of Active Exploitation of WinRAR Vulnerability CVE-2025-8088 Google Warns of Active Exploitation of WinRAR Vulnerability CVE-2025-8088 The Hacker News
Nine IP KVM Flaws Risk Unauthorized Root Access Nine IP KVM Flaws Risk Unauthorized Root Access The Hacker News
New ClickFix Campaign Exploits Sites for MIMICRAT Deployment New ClickFix Campaign Exploits Sites for MIMICRAT Deployment The Hacker News
Fortinet Exploited, China’s AI Hacks, PhaaS Empire Falls & More Fortinet Exploited, China’s AI Hacks, PhaaS Empire Falls & More The Hacker News
Fighting Automated Exploits at AI Speed Fighting Automated Exploits at AI Speed The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Zero-Day Flaw in Palo Alto Firewalls Potentially Linked to China
  • Scammers Exploit VoIP Numbers to Evade Detection
  • Boost Security Secures $4M to Enhance SDLC Defense
  • Webinar Reveals Strategies Against Stealth Cyber Breaches
  • Fake AI Installers Exploit Users with Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Zero-Day Flaw in Palo Alto Firewalls Potentially Linked to China
  • Scammers Exploit VoIP Numbers to Evade Detection
  • Boost Security Secures $4M to Enhance SDLC Defense
  • Webinar Reveals Strategies Against Stealth Cyber Breaches
  • Fake AI Installers Exploit Users with Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark