NY21:26
    LDN02:26
    HKG09:26
    TYO10:26
    Gold4,492-0.60%
    Bitcoin75,377-2.61%
    Gold4,492-0.6%
    Bitcoin75,377-2.6%
    LATEST NEWS
    Burnham launches Makerfield by-election bid as Greens reopen selection26 minutesDHS updates public events feed, spotlighting activities tied to its Washington headquartersabout 1 hourDC parks agency centralizes neighborhood programming on official events pageabout 1 hourDC Public Library Launches Dig DC: The People's Archive Digital Repositoryabout 1 hourDC.gov's official events calendar lists public programs across the Districtabout 1 hourDistrict posts DPR-1 Articles of Incorporation for domestic professional corporationsabout 1 hourDC posts central hub for unemployment insurance tax forms and guidanceabout 1 hourOpen Data DC centralizes the city’s public datasets for residents and researchersabout 1 hourDC Department of Health publishes official Marriage and Family Therapy licensing pageabout 1 hourDistrict posts draft ANC support letter for Reservoir Road traffic calmingabout 1 hourDC’s licensing hub: Department of Licensing and Consumer Protection’s occupational and professional portalabout 1 hourDC Public Library says catalog isn't sending digital hold alerts; manage holds via Libbyabout 1 hourDC.gov Hosts District’s Official Events Calendar for Public Programs and Meetingsabout 1 hourDC Public Schools’ careers page centralizes job listings and application guidanceabout 1 hourDC.gov’s official events page lists city programming and public meetingsabout 1 hourBurnham launches Makerfield by-election bid as Greens reopen selection26 minutesDHS updates public events feed, spotlighting activities tied to its Washington headquartersabout 1 hourDC parks agency centralizes neighborhood programming on official events pageabout 1 hourDC Public Library Launches Dig DC: The People's Archive Digital Repositoryabout 1 hourDC.gov's official events calendar lists public programs across the Districtabout 1 hourDistrict posts DPR-1 Articles of Incorporation for domestic professional corporationsabout 1 hourDC posts central hub for unemployment insurance tax forms and guidanceabout 1 hourOpen Data DC centralizes the city’s public datasets for residents and researchersabout 1 hourDC Department of Health publishes official Marriage and Family Therapy licensing pageabout 1 hourDistrict posts draft ANC support letter for Reservoir Road traffic calmingabout 1 hourDC’s licensing hub: Department of Licensing and Consumer Protection’s occupational and professional portalabout 1 hourDC Public Library says catalog isn't sending digital hold alerts; manage holds via Libbyabout 1 hourDC.gov Hosts District’s Official Events Calendar for Public Programs and Meetingsabout 1 hourDC Public Schools’ careers page centralizes job listings and application guidanceabout 1 hourDC.gov’s official events page lists city programming and public meetingsabout 1 hour
    Technology

    Palo Alto Firewalls Under Attack Since April 9

    A critical zero-day in Palo Alto Networks firewalls has been exploited by state-sponsored actors, leading to remote code execution and deployment of tunnel…

    Published9 May 2026, 09:40:17
    Palo Alto Firewalls Under Attack Since April 9
    A360
    Key Takeaways✦ Atlas AI
    01

    A critical zero-day vulnerability in Palo Alto Networks firewalls has been exploited for a month by suspected state-sponsored actors, enabling unauthenticated remote code execution and root access on exposed devices.

    02

    This exploitation is significant as attackers deployed sophisticated tunneling tools and performed log cleanup, indicating a high level of stealth and persistence, potentially compromising sensitive networks globally.

    03

    With over 5,400 firewalls exposed and patches due May 13, organizations must immediately implement mitigation strategies like restricting portal access to prevent further compromise, as mandated for federal agencies by CISA.

    Atlas AI

    Atlas AI

    Palo Alto Networks says suspected state-sponsored threat actors have been exploiting a critical PAN-OS firewall zero-day vulnerability since April 9, according to BleepingComputer.

    The bug, tracked as CVE-2026-0300, is a buffer overflow in the PAN-OS User-ID Authentication Portal (also known as the Captive Portal). It can allow unauthenticated remote code execution with root privileges on internet-exposed PA-Series and VM-Series firewalls.

    What researchers observed

    Palo Alto Networks said exploitation attempts began on April 9, 2026, with attackers successfully achieving remote code execution about a week later. Asourceser compromising a device, the intruders attempted to reduce the chance of detection by clearing crash kernel messages and removing crash core dump files.

    Asourceser compromising affected devices, attackers deployed the open-source tunneling tools Earthworm and ReverseSocks5 to establish covert communications and proxy connections. BleepingComputer noted that Earthworm has previously been used in attacks linked to multiple Chinese-speaking threat groups.

    Exposure and patch timeline

    Internet monitoring group Shadowserver is tracking more than 5,400 exposed PAN-OS VM-series firewalls, with most located in Asia and North America.

    Palo Alto Networks said Cloud NGFW and Panorama appliances are not impacted. The company said it is working on patches, with the first updates expected to roll out starting May 13.

    Mitigations and government directive

    Until patches are available, Palo Alto Networks advised customers to restrict access to the User-ID Authentication Portal to trusted zones, or disable the portal where possible.

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2026-0300 to its Known Exploited Vulnerabilities (KEV) Catalog and ordered Federal Civilian Executive Branch (FCEB) agencies to secure affected systems by May 9.

    Share

    Related Articles

    Atlas360

    Sign up for Atlas Daily

    The daily global news briefing you can trust.

    every weekday·Read it now

    or
    Sign in

    Already subscribed? Sign in and we won't show you this message again.