PAN-OS RCE Exploit Under Active Use Enabling Root Access and Espionage
استغلال نشط لثغرة Buffer Overflow فأنظمة PAN-OS، والمهاجمين وصلو لصلاحيات Root
PAN-OS Buffer Overflow Under Active Exploitation; Root Access Achieved
TL;DR Palo Alto Networks disclosed that threat actors tracked as CL-STA-1132 have successfully exploited CVE-2026-0300, a critical buffer overflow in the PAN-OS User-ID Authentication Portal, to achieve unauthenticated remote code execution with root privileges. Initial unsuccessful exploitation attempts began April 9, 2026, with successful compromise occurring approximately one week later. Patches are expected May 13, 2026; interim mitigations include restricting or disabling the portal and enabling threat detection rules.
What happened
On April 9, 2026, unsuccessful exploitation attempts against CVE-2026-0300 were observed on a PAN-OS device. Approximately one week later, the same threat actors achieved successful remote code execution, allowing them to inject shellcode into an nginx worker process running on the compromised appliance.
Following initial access, the attackers performed log sanitization activities—clearing crash kernel messages, deleting nginx crash entries and records, and removing crash core dump files. Between April 9 and April 29, 2026, post-exploitation activity escalated to include Active Directory enumeration and deployment of two additional payloads: EarthWorm and ReverseSocks5. These tools were deployed against a second device on April 29, 2026.
Palo Alto Networks Unit 42 is tracking this activity under the designation CL-STA-1132, described as a suspected state-sponsored threat cluster. The provenance of CL-STA-1132 is not specified in the advisory. However, the use of EarthWorm and ReverseSocks5—both previously deployed by China-nexus hacking groups—suggests operational overlap with known threat clusters.
The advisory notes that CL-STA-1132 relied on open-source tooling rather than proprietary malware, a choice that reduced signature-based detection opportunities. The attackers maintained an intermittent operational cadence over multiple weeks, deliberately avoiding behavioral detection thresholds typical of automated alerting systems.
Why it matters
CVE-2026-0300 is a buffer overflow permitting unauthenticated, remote code execution at root privilege level. The User-ID Authentication Portal is internet-facing on many deployments and does not require credentials for exploitation. A compromised PAN-OS appliance provides attackers with deep network access and high-privilege execution context—particularly valuable for espionage operations targeting edge-network infrastructure.
For SOC analysts and defenders, the documented post-exploitation chain (Active Directory enumeration followed by lateral movement tooling) signals intent to establish persistent, multi-stage access rather than opportunistic exploitation. The attackers' operational discipline—low-volume, intermittent sessions—is designed to evade automated detection systems commonly deployed in MENA-region organizations.
For systems administrators and infrastructure teams, this incident underscores the risk of internet-exposed management and authentication services on security perimeters. The User-ID Authentication Portal, while providing administrative utility, presents a single point of compromise for the entire appliance.
Affected systems and CVEs
- Palo Alto Networks PAN-OS: CVE-2026-0300 (buffer overflow in User-ID Authentication Portal service)
- CVSS score: 9.3/8.7
- Attack vector: Network, unauthenticated
- Impact: Remote code execution with root privileges
What to do
- Restrict access to the PAN-OS User-ID Authentication Portal to trusted networks and zones only; implement network segmentation to prevent internet-sourced traffic from reaching the portal.
- Disable the User-ID Authentication Portal entirely if it is not actively used in your deployment.
- Disable Response Pages in the Interface Management Profile for all Layer 3 interfaces where untrusted or internet-sourced traffic can enter your network.
- If your organization operates Advanced Threat Prevention, enable Threat ID 510019 from Applications and Threats content version 9097-10022 to detect and block exploitation attempts.
- Apply patches when released on or after May 13, 2026. Prioritize patching appliances with internet-facing management interfaces or User-ID portals.
- Review authentication logs and crash dump history for indicators of exploitation attempts prior to patching. Look for failed connection attempts to the User-ID Authentication Portal and anomalous crash entries.
Open questions
- What is the precise origin or attribution of CL-STA-1132 beyond the "suspected state-sponsored" designation? The advisory does not name a country or formal attribution.
- How many organizations or PAN-OS deployments have been targeted or compromised by this campaign?
- What was the identity or role of the second device targeted on April 29, 2026?
- What are the full scope and objectives of the espionage campaign beyond the documented Active Directory enumeration and lateral movement tool deployment?
- The advisory states unsuccessful attempts began April 9 and successful exploitation occurred "approximately one week" later, but does not specify the exact date of first successful compromise.
Source
PAN-OS RCE Exploit Under Active Use Enabling Root Access and Espionage


