Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-0265— PAN-OS: Authentication Bypass with Cloud Authentication Service (CAS) enabled

AI Predicted 9.1 Difficulty: Easy EPSS 0.08% · P23

Possible ATT&CK Techniques 1AI

T1190 · Exploit Public-Facing Application

Affected Version Matrix 6

VendorProductVersion RangeStatus
Palo Alto NetworksCloud NGFWAllunaffected
Palo Alto NetworksPAN-OS12.1.0< 12.1.7, 12.1.4-h5affected
11.2.0< 11.2.12, 11.2.10-h6, 11.2.7-h13, 11.2.4-h17affected
11.1.0< 11.1.15, 11.1.13-h5, 11.1.10-h25, 11.1.7-h6, 11.1.6-h32, 11.1.4-h33affected
10.2.0< 10.2.18-h6, 10.2.16-h7, 10.2.13-h21, 10.2.10-h36, 10.2.7-h34affected
Palo Alto NetworksPrisma AccessAllunaffected
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-0265

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
PAN-OS: Authentication Bypass with Cloud Authentication Service (CAS) enabled
Source: NVD (National Vulnerability Database)
Vulnerability Description
An authentication bypass vulnerability in Palo Alto Networks PAN-OS® software enables an unauthenticated attacker with network access to bypass authentication controls when Cloud Authentication Service (CAS) is enabled. The risk is higher if CAS is enabled on the management interface and lower when any other login interfaces are used. The risk of this issue is greatly reduced if you secure access to the management web interface by restricting access to only trusted internal IP addresses according to our recommended best practice deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 . This issue is applicable to PAN-OS software on PA-Series and VM-Series firewalls and on Panorama (virtual and M-Series). Cloud NGFW and Prisma Access® are not impacted by this vulnerability.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
密码学签名的验证不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
Palo Alto Networks PAN-OS 数据伪造问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Palo Alto Networks PAN-OS是美国Palo Alto Networks公司的一套为其防火墙设备开发的操作系统。 Palo Alto Networks PAN-OS存在数据伪造问题漏洞,该漏洞源于身份验证绕过,可能导致未经身份验证的攻击者在启用Cloud Authentication Service时绕过身份验证控制。以下产品及版本受到影响:PA-Series和VM-Series防火墙以及Panorama虚拟和M-Series上的PAN-OS软件。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Palo Alto NetworksCloud NGFW--
Palo Alto NetworksPAN-OS 12.1.0 ~ 12.1.7, 12.1.4-h5 cpe:2.3:o:palo_alto_networks:pan-os:12.1.6:*:*:*:*:*:*:*
Palo Alto NetworksPrisma Access--

II. Public POCs for CVE-2026-0265

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-0265

登录查看更多情报信息。
Advisory · 1

Same Patch Batch · Palo Alto Networks · 2026-05-13 · 26 CVEs total

CVE-2026-0238Broker VM: Improper Input Validation in Broker VM Certificate and Key Fields
CVE-2026-0242Trust Protection Foundation: SQL Injection Vulnerability
CVE-2026-0258PAN-OS: Server-Side Request Forgery (SSRF) in IKEv2 Certificate URL Fetching
CVE-2026-0245Prisma Access Agent: Information Disclosure Vulnerabilities
CVE-2026-0259WildFire WF-500 and WF-500-B: Arbitrary File Read and Delete Vulnerability in WildFire App
CVE-2026-0236Prisma Browser: Code Injection Enables Security Controls Bypass
CVE-2026-0241Trust Protection Foundation: Multiple Authorization Bypass Vulnerabilities
CVE-2026-0261PAN-OS: Authenticated Admin Command Injection Vulnerability
CVE-2026-0243Prisma SD-WAN: Denial of Service (DoS) Vulnerability Through IPv6 Crafted Packet
CVE-2026-0262PAN-OS: Denial of Service Vulnerabilities in Network Traffic Parsing
CVE-2026-0237Prisma Browser: Improperly Restricted Automation Bridge Allows Security Bypass
CVE-2026-0247Prisma Access Agent Endpoint DLP: Authorization Bypass Vulnerabilities
CVE-2026-0256PAN-OS: Stored Cross-Site Scripting (XSS) Vulnerability in the Web Interface
CVE-2026-0250GlobalProtect App: Buffer Overflow Vulnerability during connection to Portal or Gateway
CVE-2026-0264PAN-OS: Heap-Based Buffer Overflow in DNS Proxy and DNS Server Allows Unauthenticated Remo
CVE-2026-0235Prisma Browser: Access and Data Rule Bypass
CVE-2026-0251GlobalProtect App: Local Privilege Escalation Vulnerabilities
CVE-2026-0249GlobalProtect App: Certificate Validation Bypass Vulnerabilities
CVE-2026-0240Trust Protection Foundation: Sensitive Information Disclosure Vulnerability
CVE-2026-0244Prisma SD-WAN: Improper Certificate Validation Vulnerability

Showing top 20 of 26 CVEs. View all on vendor page &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2026-0265

No comments yet


Leave a comment