Palo Alto 820 - Software Update for CVE-2026-0300

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

Palo Alto 820 - Software Update for CVE-2026-0300

L3 Networker

Hi there,

 

I'm trying to patch the current secruity waring for CVE-2026-0300, but it is not clear to me which software version will fix the problem.

 

My current system is on 11.1.10-h10 (PA-820 cluster).

The official document from PA can be found here: https://security.paloaltonetworks.com/CVE-2026-0300

 

The versions in the product table which would fix the problem, don't appear in my panorama's update list.

2026-05-06 08_22_59-PA.png

So which one will fix the problem?

 

Any hint?

 

thx

Daniel

1 accepted solution

Accepted Solutions

Cyber Elite

Hi @Netzer 

 

Right now there is no fix available yet. You'll need to apply remediation as suggested in the article under "Workarounds and Mitigations" until a PANOS hotfix is available (expected dates are also listed in the article)

Tom Piens
PANgurus - Strata & Prisma Access specialist

View solution in original post

4 REPLIES 4

Cyber Elite

Hi @Netzer 

 

Right now there is no fix available yet. You'll need to apply remediation as suggested in the article under "Workarounds and Mitigations" until a PANOS hotfix is available (expected dates are also listed in the article)

Tom Piens
PANgurus - Strata & Prisma Access specialist

L2 Linker

Does anyone know what PA (unique) threat ID for this?  I checked the Threat Vault, but it says it "has not been reviewed yet" - so no ID attached.  I updated my threat signatures, etc., but would like to filter/monitor on if I see any threats associated with this CVE.  Thank you. 

39.9259° N, 75.1196° W

L0 Member

This is a follow up question for anyone that has more knowledge of captive portals than me but does CVE-2026-300 also effect captive portals that are configured in transparent mode?

L0 Member

According to this morning's emergency content update email, the Threat ID is 510019.  It was the only change listed for version 9097.

 

Also, why is this feature on by default?  Having an open listener on a port for a service that isn't required is a poor security practice.  Surely it can be turned on IF someone decides to use Global Protect?  Or are there other functions that needs the captive portal enabled?  We probably need to recheck our own best practices and firewall build process, but again, why is this even on by default?

  • 1 accepted solution
  • 168 Views
  • 4 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!