Skip to main content
Mallory

Critical Palo Alto GlobalProtect Command Injection Led to Active Exploitation

actively-exploited-vulnerabilitygovernment-vulnerability-catalogperimeter-device-exposurewidely-deployed-product-advisoryproof-of-concept-release
Updated April 27, 2026 at 03:02 PM7 sources
Share:
Critical Palo Alto GlobalProtect Command Injection Led to Active Exploitation

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

A critical command injection flaw in Palo Alto Networks GlobalProtect exposed internet-facing devices running affected PAN-OS versions to unauthenticated remote code execution with root-level access. Palo Alto confirmed the vulnerability was being exploited in the wild, and CISA added it to the Known Exploited Vulnerabilities (KEV) catalog. The issue affected systems with GlobalProtect enabled on PAN-OS 10.2, 11.0, and 11.1, and public proof-of-concept exploit code increased the urgency for defenders to patch.

Finland’s National Cyber Security Centre said it issued a serious warning after receiving the first breach notifications tied to the flaw and identified several hundred potentially vulnerable Palo Alto devices in domestic networks. About 15 incident reports related to Palo Alto devices were received, though no more serious breach cases were identified. Early vendor guidance that disabling telemetry could mitigate risk was later deemed insufficient, prompting a shift to immediate patching; fixes were released for supported branches including 10.2.9-h1, 11.0.4-h1, and 11.1.2-h3, after which the Finnish warning was withdrawn as the threat subsided.

Timeline

  1. Feb 14, 2025

    Palo Alto discloses exploited PAN-OS management interface vulnerability

    Palo Alto disclosed a serious PAN-OS vulnerability affecting firewall management interfaces that allows an unauthenticated attacker to invoke certain PHP scripts and impact system integrity and confidentiality. The vendor released fixes for supported PAN-OS 10.1, 10.2, 11.1, and 11.2 versions, while noting exploitation attempts and public proof-of-concept code.

  2. May 7, 2024

    Finland removes Palo Alto GlobalProtect warning

    The Finnish National Cyber Security Centre removed its earlier warning because the threat to organizations had subsided after affected devices were updated. This marked the de-escalation of the domestic response to the vulnerability.

  3. May 7, 2024

    Finnish authorities receive about 15 Palo Alto-related incident reports

    During the response period, Finland’s National Cyber Security Centre received around 15 incident reports related to Palo Alto devices, though no more serious breach cases were identified. The reports reflected active domestic impact from the vulnerability.

  4. Apr 18, 2024

    Finland issues serious warning after first domestic breach notifications

    Finland’s National Cyber Security Centre issued a serious warning about the Palo Alto GlobalProtect vulnerability after receiving the first incident notifications in Finland. The centre observed several hundred potentially vulnerable devices in domestic networks.

  5. Apr 17, 2024

    Palo Alto publishes broader fixed versions across PAN-OS branches

    By 17 April 2024, Palo Alto had identified fixed releases including PAN-OS 10.2.9-h1, 11.0.4-h1, 11.1.2-h3, and later versions, with additional fixes for older maintenance branches. A Threat Prevention mitigation and support workflows for compromise checks remained available.

  6. Apr 17, 2024

    Need for patching becomes urgent as workaround proves insufficient

    By 17 April 2024, it became clear that earlier guidance to disable telemetry was not sufficient protection, especially after proof-of-concept exploit code became public. Defenders were urged to install vendor patches immediately, and CISA had added the issue to its Known Exploited Vulnerabilities catalog.

  7. Apr 14, 2024

    Palo Alto releases initial fixes for GlobalProtect vulnerability

    Palo Alto Networks published initial patches for a critical command injection vulnerability affecting GlobalProtect on PAN-OS 10.2, 11.0, and 11.1. The flaw could allow an unauthenticated remote attacker to gain root access and execute arbitrary code.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Sources

February 14, 2025 at 12:00 AM
kyberturvallisuuskeskus alerts
Huhtikuun Kybersää 2024 | Traficom
May 10, 2024 at 12:00 AM
May 10, 2024 at 12:00 AM
May 7, 2024 at 12:00 AM
April 19, 2024 at 12:00 AM

2 more from sources like kyberturvallisuuskeskus alerts

Related Stories

Active Exploitation of PAN-OS Captive Portal Flaw Gives Attackers Root on Firewalls

Active Exploitation of PAN-OS Captive Portal Flaw Gives Attackers Root on Firewalls

Palo Alto Networks disclosed **CVE-2026-0300**, a critical buffer overflow in the PAN-OS **User-ID Authentication Portal** (also called the Captive Portal) that is being exploited in the wild to achieve unauthenticated remote code execution with **root privileges**. The flaw is an out-of-bounds write triggered by specially crafted packets and affects exposed **PA-Series** and **VM-Series** firewalls running multiple PAN-OS 10.2, 11.1, 11.2, and 12.1 versions. Palo Alto assigned the issue a **CVSS 9.3** when the portal is reachable from the public internet or other untrusted networks, and **8.7** when access is limited to trusted internal IP addresses. The company said observed attacks have focused on Authentication Portal instances exposed to untrusted IP addresses, while **Prisma Access**, **Cloud NGFW**, and **Panorama** are not affected. At disclosure, fixes were not yet broadly available, with patch releases scheduled to begin in mid-May and continue through late May 2026. Palo Alto urged customers to immediately restrict portal access to trusted zones or internal IPs, or disable the Authentication Portal if it is not required, and said a **Threat Prevention Signature** for PAN-OS 11.1 and later was released as an added mitigation layer.

Today
Palo Alto Networks PAN-OS GlobalProtect DoS Vulnerability (CVE-2026-0227)

Palo Alto Networks PAN-OS GlobalProtect DoS Vulnerability (CVE-2026-0227)

Palo Alto Networks released fixes for **CVE-2026-0227**, a high-severity denial-of-service vulnerability in **PAN-OS** that can be triggered by an **unauthenticated** attacker when the **GlobalProtect gateway or portal** is enabled on affected next-generation firewall and *Prisma Access* configurations. Repeated exploitation attempts can force impacted firewalls into **maintenance mode**, effectively disabling protections and causing service disruption; Palo Alto Networks stated there are **no workarounds** and advised upgrading to patched releases. Reporting indicates a **proof-of-concept (PoC)** exploit exists, although Palo Alto Networks said it had **no evidence of in-the-wild exploitation** at the time of advisory publication. Exposure risk remains material given the large number of internet-facing Palo Alto Networks firewalls observed online (with Shadowserver tracking roughly **6,000** exposed devices) and ongoing scanning activity historically targeting exposed GlobalProtect endpoints; administrators should prioritize patching across affected PAN-OS and Prisma Access versions and validate whether GlobalProtect is enabled on externally reachable interfaces.

1 months ago
Critical Cisco Secure Email Gateway and PAN-OS Flaws Expose Perimeter Devices

Critical Cisco Secure Email Gateway and PAN-OS Flaws Expose Perimeter Devices

Cisco disclosed a **critical vulnerability** in Secure Email Gateway appliances running affected `AsyncOS` versions when inbound mail rules use **File Analysis** (`Cisco AMP`) or **Content Filter** features and the bundled **Content Scanner Tools** are older than `23.3.0.4823`. Successful exploitation can let an attacker overwrite files at the operating-system level, enabling **root-level account creation**, configuration changes, arbitrary code execution, and denial of service. Cisco released software updates and said no alternative mitigations are available. Palo Alto Networks also issued fixes for a **serious PAN-OS management interface flaw** that allows an unauthenticated attacker to execute certain PHP scripts and affect the **integrity and confidentiality** of the firewall, though the vendor said it does not permit arbitrary remote code execution. Exploitation attempts have already been observed and proof-of-concept code is public, increasing urgency for exposed management interfaces. Palo Alto said **Cloud NGFW** and **Prisma Access** are not affected, while `PAN-OS 11.0` is out of support and will not receive a patch.

1 weeks ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.