<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Palo Alto 820 - Software Update for CVE-2026-0300 in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-alto-820-software-update-for-cve-2026-0300/m-p/1253542#M6897</link>
    <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/20138"&gt;@chrise_coh&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;...&lt;/P&gt;
&lt;P&gt;Surely it can be turned on &lt;STRONG&gt;IF&lt;/STRONG&gt; someone decides to use Global Protect?&amp;nbsp; Or are there other functions that needs the captive portal enabled?&amp;nbsp; We probably need to recheck our own best practices and firewall build process, but again, why is this even on by default?&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;As far as I can tell, the User-ID Authentication Portal is primarily used for 2 functions:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Authentication of users of a Captive Portal&lt;/LI&gt;
&lt;LI&gt;Authentication of users captured by an Authentication Policy to access a network resource (requiring additional firewall authentication to access by src/dest IP, service, etc.)&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;Both of these larger functions are enabled by default and this is the underlying authentication method to authorize their use. It appears that this does not affect GlobalProtect using external Portals/Gateways (currently testing across multiple firewalls and several hundred users). There is also some confusion in Reddit forums about whether this affects the User-ID in the Network Zone configurations. I suspect that it does not, I believe the User-ID there refers to whether or not traffic traversing those Zones will have User-ID fields applied in Security/etc. Policies and whether probes will be sent (if configured). But there is not a lot of information available yet.&lt;/P&gt;</description>
    <pubDate>Wed, 06 May 2026 16:59:10 GMT</pubDate>
    <dc:creator>Adrian_Jensen</dc:creator>
    <dc:date>2026-05-06T16:59:10Z</dc:date>
    <item>
      <title>Palo Alto 820 - Software Update for CVE-2026-0300</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-alto-820-software-update-for-cve-2026-0300/m-p/1253486#M6890</link>
      <description>&lt;P&gt;Hi there,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm trying to patch the current secruity waring for&amp;nbsp;CVE-2026-0300, but it is not clear to me which software version will fix the problem.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My current system is on 11.1.10-h10 (PA-820 cluster).&lt;/P&gt;
&lt;P&gt;The official document from PA can be found here:&amp;nbsp;&lt;A href="https://security.paloaltonetworks.com/CVE-2026-0300" target="_blank"&gt;https://security.paloaltonetworks.com/CVE-2026-0300&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The versions in the product table which would fix the problem, don't appear in my panorama's update list.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2026-05-06 08_22_59-PA.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/71342i065414500CE38420/image-size/medium?v=v2&amp;amp;px=400" role="button" title="2026-05-06 08_22_59-PA.png" alt="2026-05-06 08_22_59-PA.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;So which one will fix the problem?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any hint?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thx&lt;/P&gt;
&lt;P&gt;Daniel&lt;/P&gt;</description>
      <pubDate>Wed, 06 May 2026 06:27:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-alto-820-software-update-for-cve-2026-0300/m-p/1253486#M6890</guid>
      <dc:creator>Netzer</dc:creator>
      <dc:date>2026-05-06T06:27:44Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto 820 - Software Update for CVE-2026-0300</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-alto-820-software-update-for-cve-2026-0300/m-p/1253497#M6891</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/130557"&gt;@Netzer&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Right now there is no fix available yet. You'll need to apply remediation as suggested in the article under "Workarounds and Mitigations" until a PANOS hotfix is available (expected dates are also listed in the article)&lt;/P&gt;</description>
      <pubDate>Wed, 06 May 2026 07:16:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-alto-820-software-update-for-cve-2026-0300/m-p/1253497#M6891</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2026-05-06T07:16:36Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto 820 - Software Update for CVE-2026-0300</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-alto-820-software-update-for-cve-2026-0300/m-p/1253536#M6893</link>
      <description>&lt;P&gt;Does anyone know what PA (unique) threat ID for this?&amp;nbsp; I checked the Threat Vault, but it says it "has not been reviewed yet" - so no ID attached.&amp;nbsp; I updated my threat signatures, etc., but would like to filter/monitor on if I see any threats associated with this CVE.&amp;nbsp; Thank you.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 06 May 2026 15:01:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-alto-820-software-update-for-cve-2026-0300/m-p/1253536#M6893</guid>
      <dc:creator>johnlinkowsky</dc:creator>
      <dc:date>2026-05-06T15:01:10Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto 820 - Software Update for CVE-2026-0300</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-alto-820-software-update-for-cve-2026-0300/m-p/1253537#M6894</link>
      <description>&lt;P&gt;This is a follow up question for anyone that has more knowledge of captive portals than me but does CVE-2026-300 also effect captive portals that are configured in transparent mode?&lt;/P&gt;</description>
      <pubDate>Wed, 06 May 2026 15:02:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-alto-820-software-update-for-cve-2026-0300/m-p/1253537#M6894</guid>
      <dc:creator>rwilkins</dc:creator>
      <dc:date>2026-05-06T15:02:45Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto 820 - Software Update for CVE-2026-0300</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-alto-820-software-update-for-cve-2026-0300/m-p/1253538#M6895</link>
      <description>&lt;P&gt;According to this morning's emergency content update email, the Threat ID is&amp;nbsp;510019.&amp;nbsp; It was the only change listed for version 9097.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also, why is this feature on by default?&amp;nbsp; Having an open listener on a port for a service that isn't required is a poor security practice.&amp;nbsp; Surely it can be turned on &lt;STRONG&gt;IF&lt;/STRONG&gt; someone decides to use Global Protect?&amp;nbsp; Or are there other functions that needs the captive portal enabled?&amp;nbsp; We probably need to recheck our own best practices and firewall build process, but again, why is this even on by default?&lt;/P&gt;</description>
      <pubDate>Wed, 06 May 2026 15:54:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-alto-820-software-update-for-cve-2026-0300/m-p/1253538#M6895</guid>
      <dc:creator>chrise_coh</dc:creator>
      <dc:date>2026-05-06T15:54:44Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto 820 - Software Update for CVE-2026-0300</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-alto-820-software-update-for-cve-2026-0300/m-p/1253540#M6896</link>
      <description>&lt;P&gt;I did receive that Emergency alert, but I don't see anywhere on that email where the unique threat ID is listed for THIS CVE - I only see:&amp;nbsp;&lt;/P&gt;
&lt;TABLE width="100%"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P&gt;Palo Alto Networks PAN-OS Out-of-Bounds Read Vulnerability - 510019 Unique ID which is a medium and 'alert'&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It's also not listed on the CVE alert page:&amp;nbsp;&amp;nbsp;&lt;A href="https://security.paloaltonetworks.com/CVE-2026-0300" target="_blank"&gt;https://security.paloaltonetworks.com/CVE-2026-0300&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 06 May 2026 16:50:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-alto-820-software-update-for-cve-2026-0300/m-p/1253540#M6896</guid>
      <dc:creator>johnlinkowsky</dc:creator>
      <dc:date>2026-05-06T16:50:53Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto 820 - Software Update for CVE-2026-0300</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-alto-820-software-update-for-cve-2026-0300/m-p/1253542#M6897</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/20138"&gt;@chrise_coh&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;...&lt;/P&gt;
&lt;P&gt;Surely it can be turned on &lt;STRONG&gt;IF&lt;/STRONG&gt; someone decides to use Global Protect?&amp;nbsp; Or are there other functions that needs the captive portal enabled?&amp;nbsp; We probably need to recheck our own best practices and firewall build process, but again, why is this even on by default?&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;As far as I can tell, the User-ID Authentication Portal is primarily used for 2 functions:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Authentication of users of a Captive Portal&lt;/LI&gt;
&lt;LI&gt;Authentication of users captured by an Authentication Policy to access a network resource (requiring additional firewall authentication to access by src/dest IP, service, etc.)&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;Both of these larger functions are enabled by default and this is the underlying authentication method to authorize their use. It appears that this does not affect GlobalProtect using external Portals/Gateways (currently testing across multiple firewalls and several hundred users). There is also some confusion in Reddit forums about whether this affects the User-ID in the Network Zone configurations. I suspect that it does not, I believe the User-ID there refers to whether or not traffic traversing those Zones will have User-ID fields applied in Security/etc. Policies and whether probes will be sent (if configured). But there is not a lot of information available yet.&lt;/P&gt;</description>
      <pubDate>Wed, 06 May 2026 16:59:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-alto-820-software-update-for-cve-2026-0300/m-p/1253542#M6897</guid>
      <dc:creator>Adrian_Jensen</dc:creator>
      <dc:date>2026-05-06T16:59:10Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto 820 - Software Update for CVE-2026-0300</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-alto-820-software-update-for-cve-2026-0300/m-p/1253553#M6898</link>
      <description>&lt;P&gt;Adrian_Jensen - thank you for the clarification!&amp;nbsp; I looked up the Reddit info, it looks to be correct - the CVE article has an update with clarification on what's affected:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Customers are impacted if both of the following conditions are true:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;User-ID Authentication Portal configured in the User-ID Authentication Portal Settings page. You can verify the configuration by going to Device &amp;gt; User Identification &amp;gt; Authentication Portal Settings -&amp;gt; Enable Authentication Portal (applies to both transparent and redirect modes)&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;and&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;An interface management profile with response pages enabled and associated with an external/internet-accessible interface. You can verify the configuration by going to Network &amp;gt; Interface &amp;gt; Select the interface &amp;gt; Advanced Tab &amp;gt; Create Management Interface Profile.&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Wed, 06 May 2026 20:24:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-alto-820-software-update-for-cve-2026-0300/m-p/1253553#M6898</guid>
      <dc:creator>chrise_coh</dc:creator>
      <dc:date>2026-05-06T20:24:00Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto 820 - Software Update for CVE-2026-0300</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-alto-820-software-update-for-cve-2026-0300/m-p/1253554#M6899</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/20138"&gt;@chrise_coh&lt;/a&gt;&amp;nbsp;- The CVE article discusses an Interface Management profile attached to an interface ("User-ID" under Network Services in the profile). This is what would run the User-ID Authentication Portal on that interface (and shouldn't generally be available on a "public" interface).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The Reddit thread I was looking at was claiming that having "User-ID" enabled in the Zone (Network-&amp;gt;Zones-&amp;gt;[zonename]-&amp;gt;User Identification ACL-&amp;gt;Enable User Identification) also exposed the vulnerability. I believe this is incorrect as the NGFW manual states:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;If you configured User-ID... the best practice is to Enable User Identification to apply the mapping information to traffic in this zone. If you disable this option, firewall logs, reports, and policies will exclude user mapping information for traffic within the zone.
By default, if you select this option, the firewall applies user mapping information to the traffic of all subnetworks in the zone...&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The Zone User-ID use would seem to only apply to its use in Security/NAT Policies, logging, etc. The vulnerability would seem to apply only to the User-ID Authentication Portal (where a user is required to identify themselves for further access), not to anywhere User-ID is used in the firewall. Or at least the best I can figure.&lt;/P&gt;</description>
      <pubDate>Wed, 06 May 2026 21:05:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-alto-820-software-update-for-cve-2026-0300/m-p/1253554#M6899</guid>
      <dc:creator>Adrian_Jensen</dc:creator>
      <dc:date>2026-05-06T21:05:04Z</dc:date>
    </item>
  </channel>
</rss>

