Palo Alto Networks has confirmed that threat actors may have attempted to exploit a recently disclosed critical vulnerability in PAN-OS software as early as April 9, 2026. The flaw, tracked as CVE-2026-0300 with CVSS scores of 9.3 and 8.7, is a buffer overflow vulnerability located in the User ID Authentication Portal service of PAN-OS. Successful exploitation allows an unauthenticated attacker to execute arbitrary code with root privileges by sending specially crafted network packets to affected systems. The company has indicated that patches are scheduled to begin rolling out from May 13, 2026, and has advised customers to immediately restrict access to the User ID Authentication Portal by limiting exposure to trusted network zones or disabling the service entirely if it is not required in their environment.
As part of its mitigation guidance, Palo Alto Networks has also recommended disabling Response Pages within the Interface Management Profile for any Layer 3 interface that may receive untrusted or internet bound traffic. Organizations using Advanced Threat Prevention capabilities can further reduce exposure by enabling Threat ID 510019 from Applications and Threats content version 9097-10022, which is designed to detect and block exploitation attempts targeting this vulnerability. The advisory highlights that exploitation activity has been observed in limited instances, and the company is actively tracking related operations under the designation CL STA 1132, which is assessed to be a suspected state sponsored threat cluster of currently unknown origin.
According to Palo Alto Networks Unit 42, attackers associated with this activity leveraged CVE-2026-0300 to achieve unauthenticated remote code execution on PAN-OS devices. Upon successful exploitation, the attackers were able to inject shellcode directly into an nginx worker process, establishing a foothold within the compromised system. The company further observed unsuccessful exploitation attempts beginning on April 9, 2026, followed by successful compromise approximately one week later, when attackers achieved stable remote code execution and proceeded to inject malicious code into the appliance environment. Once access was established, the threat actors initiated anti forensic actions, including clearing kernel crash messages, deleting nginx crash logs, removing crash entries, and erasing core dump files in an attempt to obscure their activity and delay detection.
Post exploitation behavior attributed to the adversary included Active Directory enumeration and deployment of additional payloads, specifically EarthWorm and ReverseSocks5, which were used against a secondary device on April 29, 2026. Both tools have previously been associated with multiple China nexus threat activity clusters and are commonly used for tunneling and lateral movement within compromised networks. Unit 42 noted that over the past five years, nation state threat actors involved in cyber espionage have increasingly targeted edge network infrastructure such as firewalls, routers, VPN systems, IoT devices, and hypervisors due to their privileged access levels and comparatively weaker endpoint style logging and detection capabilities.
The analysis further highlights that the operators behind CL STA 1132 relied heavily on open source tooling rather than custom malware, a strategy that reduces detection by signature based security systems and allows easier blending into legitimate network activity. Their operational pattern involved controlled intermittent access sessions over extended periods, designed to remain below behavioral detection thresholds used by automated monitoring systems. This combination of targeting edge infrastructure, minimizing malware uniqueness, and maintaining low intensity interaction cycles reflects a broader trend in cyber espionage operations where stealth and persistence are prioritized over rapid disruptive activity.
Follow the SPIN IDG WhatsApp Channel for updates across the Smart Pakistan Insights Network covering all of Pakistan’s technology ecosystem.





