Authentic8 Security Advisory 20260506-1
Determination of Silo non-susceptibility to PAN-OS Authentication Portal RCE (CVE-2026-0300)
Associated CVE IDs CVE-2026-0300
Description
Authentic8 is not vulnerable to CVE-2026-0300 (PAN-OS Authentication Portal RCE).
CVE-2026-0300 is a critical (CVSS 9.3) unauthenticated buffer overflow in the User-ID™ Authentication Portal (also known as the Captive Portal) of Palo Alto Networks PAN-OS. Successful exploitation grants remote code execution with root privileges on PA-Series and VM-Series firewalls, and the vendor has confirmed active in-the-wild exploitation. Authentic8 is not vulnerable to this issue, as the impacted feature is not enabled on any applicable infrastructure leveraged by Authentic8.
Findings
Authentic8's Security team has reviewed the Palo Alto Networks advisory and confirmed:
The User-ID™ Authentication Portal (Captive Portal) feature identified in CVE-2026-0300 is not enabled within Authentic8.
No Authentic8 customer data is implicated.
We will continue to monitor the situation and update this advisory as new information becomes available.
Mitigation / Remediation
Authentic8 will apply the vendor-recommended patched version of PAN-OS as soon as it is released by Palo Alto Networks. No customer action is required.
Additional Notes
Please contact Support if you have further questions or need additional information.
Disclaimer
Because this is a developing security event, Authentic8 reserves the right to change or update this advisory at any time and expects to update it as new information becomes available. This document is provided on an "as is" basis and does not imply any kind of guarantee or warranty, including the warranties of merchantability or fitness for a particular use. Your use of the information in this advisory or materials linked herein is at your own risk.