Authentication Bypass Vulnerability in Palo Alto Networks PAN-OS Software
CVE-2026-0265
2.7LOW
What is CVE-2026-0265?
The vulnerability allows unauthenticated attackers with network access to bypass authentication controls when the Cloud Authentication Service is enabled. This issue is particularly concerning when CAS is active on the management interface. To mitigate the risk, it is essential to limit access to the management web interface by following best practices that restrict access to trusted internal IP addresses. Notably, this vulnerability does not affect Cloud NGFW and Prisma Access.
Affected Version(s)
PAN-OS 12.1.0 < 12.1.7, 12.1.4-h5
PAN-OS 11.2.0 < 11.2.12, 11.2.10-h6, 11.2.7-h13, 11.2.4-h17
PAN-OS 11.1.0 < 11.1.15, 11.1.13-h5, 11.1.10-h25, 11.1.7-h6, 11.1.6-h32, 11.1.4-h33
References
CVSS V4
Score:
2.7
Severity:
LOW
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
None
Timeline
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved
Credit
Palo Alto Networks thanks Harsh Jaiswal from Hacktron AI and our internal security research teams for discovering and reporting this issue.