Palo Alto Networks disclosed CVE-2026-0300, a buffer overflow in PAN-OS User-ID Authentication Portal that can let unauthenticated attackers gain root code execution on PA-Series and VM-Series firewalls. Unit 42 attributes limited real-world exploitation to CL-STA-1132, which used shellcode injection, EarthWorm, ReverseSocks5, Active Directory enumeration, and log wiping to maintain access. #CVE-2026-0300 #PANOS #CL-STA-1132 #EarthWorm #ReverseSocks5
Keypoints
- Palo Alto Networks released an advisory on May 6, 2026 for CVE-2026-0300, a buffer overflow in the User-ID Authentication Portal service.
- The flaw can allow an unauthenticated attacker to execute arbitrary code with root privileges on PA-Series and VM-Series firewalls.
- Unit 42 says exploitation has been limited so far, but it is tracking a likely state-sponsored cluster called CL-STA-1132.
- Attackers achieved remote code execution, injected shellcode into an nginx worker process, and then began cleanup actions to reduce detection.
- Post-exploitation activity included deployment of EarthWorm and ReverseSocks5, plus Active Directory enumeration using firewall-derived credentials.
- The attackers also deleted crash logs, core dumps, audit evidence, and a SUID privilege escalation binary to hide traces of compromise.
- Palo Alto recommends restricting or disabling the User-ID Authentication Portal, and customers can block attacks with Threat ID 510019 on supported PAN-OS versions.
MITRE Techniques
- [T1068 ] Exploitation for Privilege Escalation â The buffer overflow allowed the attacker to gain root privileges on the firewall after unauthenticated access (âallows an unauthenticated attacker to execute arbitrary code with root privilegesâ).
- [T1190 ] Exploit Public-Facing Application â The exposed User-ID Authentication Portal was targeted over network traffic to achieve initial compromise (âsending specially crafted packets through network trafficâ).
- [T1055 ] Process Injection â The attacker injected shellcode into an nginx worker process after successful exploitation (âthe attacker was able to inject shellcode into an nginx worker processâ).
- [T1021.002 ] Remote Services: SMB/Windows Admin Shares â Not explicitly described as SMB, but Active Directory targeting and lateral access imply network-based internal administration after compromise (âconducted Active Directory (AD) enumerationâ).
- [T1087.002 ] Account Discovery: Domain Account â The attackers enumerated Active Directory identities and domains using credentials likely obtained from the firewall (âusing the firewallâs service account credentials to target domain root and DomainDnsZonesâ).
- [T1070.004 ] File Deletion â They removed crash core dumps, nginx crash entries, and other evidence to hinder investigation (âdeleting nginx crash entries and nginx crash records, as well as removing crash core dump filesâ).
- [T1070.001 ] Clear Windows Event Logs â The campaign included log cleanup to reduce detection, including audit-log evidence removal (âdeleted ptrace injection evidence from the audit logâ).
- [T1090 ] Proxy â EarthWorm and ReverseSocks5 were used to create SOCKS5 tunnels and proxy traffic through the compromised environment (âinitiates a forward SOCKS5 serverâ / âcreates a SOCKS5 proxy tunnelâ).
- [T1572 ] Protocol Tunneling â EarthWorm encapsulated traffic such as RDP and SSH within SOCKS tunnels to move covertly (âencapsulates traffic for protocols like RDP and SSH within SOCKS tunnelsâ).
- [T1078 ] Valid Accounts â The attackers used credentials likely obtained from the firewall to perform AD enumeration and later access (âusing the firewallâs service account credentialsâ).
Indicators of Compromise
- [IP addresses] C2/staging and related infrastructure â 67.206.213[.]86, 146.70.100[.]69, and other 2 IPs
- [URLs] tool download locations â hxxp[:]//146.70.100[.]69:8000/php_sess, hxxps[:]//github[.]com/Acebond/ReverseSocks5/releases/download/v2.2.0/ReverseSocks5-v2.2.0-linux-amd64.tar[.]gz
- [File hashes] EarthWorm binary â e11f69b49b6f2e829454371c31ebf86893f82a042dae3f2faf63dcd84f97a584
- [File paths] dropped tunneling tools and scripts â /var/tmp/linuxap, /var/tmp/linuxda, /var/tmp/linuxupdate, and other 2 items
- [File paths] ReverseSocks5 staging and script locations â /tmp/.c, /tmp/R5, /var/R5
- [User agent strings] attacker browser fingerprint â Safari/532.31 Mozilla/5.5 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/138.0.0.0 Safari/537.36 Edg/138.0.0.0
Read more: https://unit42.paloaltonetworks.com/captive-portal-zero-day/