Threat Brief: Exploitation of PAN-OS Captive Portal Zero-Day for Unauthenticated Remote Code Execution

Threat Brief: Exploitation of PAN-OS Captive Portal Zero-Day for Unauthenticated Remote Code Execution

Palo Alto Networks disclosed CVE-2026-0300, a buffer overflow in PAN-OS User-ID Authentication Portal that can let unauthenticated attackers gain root code execution on PA-Series and VM-Series firewalls. Unit 42 attributes limited real-world exploitation to CL-STA-1132, which used shellcode injection, EarthWorm, ReverseSocks5, Active Directory enumeration, and log wiping to maintain access. #CVE-2026-0300 #PANOS #CL-STA-1132 #EarthWorm #ReverseSocks5

Keypoints

  • Palo Alto Networks released an advisory on May 6, 2026 for CVE-2026-0300, a buffer overflow in the User-ID Authentication Portal service.
  • The flaw can allow an unauthenticated attacker to execute arbitrary code with root privileges on PA-Series and VM-Series firewalls.
  • Unit 42 says exploitation has been limited so far, but it is tracking a likely state-sponsored cluster called CL-STA-1132.
  • Attackers achieved remote code execution, injected shellcode into an nginx worker process, and then began cleanup actions to reduce detection.
  • Post-exploitation activity included deployment of EarthWorm and ReverseSocks5, plus Active Directory enumeration using firewall-derived credentials.
  • The attackers also deleted crash logs, core dumps, audit evidence, and a SUID privilege escalation binary to hide traces of compromise.
  • Palo Alto recommends restricting or disabling the User-ID Authentication Portal, and customers can block attacks with Threat ID 510019 on supported PAN-OS versions.

MITRE Techniques

  • [T1068 ] Exploitation for Privilege Escalation – The buffer overflow allowed the attacker to gain root privileges on the firewall after unauthenticated access (‘allows an unauthenticated attacker to execute arbitrary code with root privileges’).
  • [T1190 ] Exploit Public-Facing Application – The exposed User-ID Authentication Portal was targeted over network traffic to achieve initial compromise (‘sending specially crafted packets through network traffic’).
  • [T1055 ] Process Injection – The attacker injected shellcode into an nginx worker process after successful exploitation (‘the attacker was able to inject shellcode into an nginx worker process’).
  • [T1021.002 ] Remote Services: SMB/Windows Admin Shares – Not explicitly described as SMB, but Active Directory targeting and lateral access imply network-based internal administration after compromise (‘conducted Active Directory (AD) enumeration’).
  • [T1087.002 ] Account Discovery: Domain Account – The attackers enumerated Active Directory identities and domains using credentials likely obtained from the firewall (‘using the firewall’s service account credentials to target domain root and DomainDnsZones’).
  • [T1070.004 ] File Deletion – They removed crash core dumps, nginx crash entries, and other evidence to hinder investigation (‘deleting nginx crash entries and nginx crash records, as well as removing crash core dump files’).
  • [T1070.001 ] Clear Windows Event Logs – The campaign included log cleanup to reduce detection, including audit-log evidence removal (‘deleted ptrace injection evidence from the audit log’).
  • [T1090 ] Proxy – EarthWorm and ReverseSocks5 were used to create SOCKS5 tunnels and proxy traffic through the compromised environment (‘initiates a forward SOCKS5 server’ / ‘creates a SOCKS5 proxy tunnel’).
  • [T1572 ] Protocol Tunneling – EarthWorm encapsulated traffic such as RDP and SSH within SOCKS tunnels to move covertly (‘encapsulates traffic for protocols like RDP and SSH within SOCKS tunnels’).
  • [T1078 ] Valid Accounts – The attackers used credentials likely obtained from the firewall to perform AD enumeration and later access (‘using the firewall’s service account credentials’).

Indicators of Compromise

  • [IP addresses] C2/staging and related infrastructure – 67.206.213[.]86, 146.70.100[.]69, and other 2 IPs
  • [URLs] tool download locations – hxxp[:]//146.70.100[.]69:8000/php_sess, hxxps[:]//github[.]com/Acebond/ReverseSocks5/releases/download/v2.2.0/ReverseSocks5-v2.2.0-linux-amd64.tar[.]gz
  • [File hashes] EarthWorm binary – e11f69b49b6f2e829454371c31ebf86893f82a042dae3f2faf63dcd84f97a584
  • [File paths] dropped tunneling tools and scripts – /var/tmp/linuxap, /var/tmp/linuxda, /var/tmp/linuxupdate, and other 2 items
  • [File paths] ReverseSocks5 staging and script locations – /tmp/.c, /tmp/R5, /var/R5
  • [User agent strings] attacker browser fingerprint – Safari/532.31 Mozilla/5.5 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/138.0.0.0 Safari/537.36 Edg/138.0.0.0


Read more: https://unit42.paloaltonetworks.com/captive-portal-zero-day/