Palo Alto patches a worrying security issue which could crash your firewall without even logging in
The flaw affects firewalls running PAN-OS 10.1+ and Prisma Access with GlobalProtect enabled; nearly 6,000 devices are tracked online by security groups, Palo Alto confirmed patch rollout.
- On Wednesday, Palo Alto Networks patched a high-severity PAN-OS flaw tracked as CVE-2026-0227 affecting PAN-OS 10.1 or later and said it had yet to find evidence of exploitation.
- A vulnerability in Palo Alto Networks PAN-OS software enables an unauthenticated attacker to cause a denial of service to the firewall. Repeated attempts result in the firewall entering maintenance mode, Palo Alto Networks explained.
- Security trackers show Shadowserver tracks nearly 6,000 exposed Palo Alto Networks firewalls, while GreyNoise warned of brute-force attempts from more than 7,000 IPs targeting GlobalProtect portals recently.
- Palo Alto Networks released security updates for all affected PAN-OS versions, urging administrators to upgrade; most Prisma Access cloud instances have been upgraded, with remaining customers scheduled promptly.
- As a widely used vendor, Palo Alto Networks serves over 70,000 customers including most largest U.S. banks and 90% of Fortune 10 companies and recently patched exploited PAN-OS zero-days in November 2024 and December 2024.
8 Articles
8 Articles
Palo Alto Networks Patches PAN-OS Bug That Can Disrupt GlobalProtect
A Palo Alto Networks firewall vulnerability could let attackers disrupt remote access for organizations that depend on GlobalProtect, potentially pushing affected systems into maintenance mode and interrupting service. The flaw in PAN-OS that can be exploited by unauthenticated attackers over the network against GlobalProtect gateways and portals. The vulnerability “… enables an unauthenticated attacker to cause a denial of service (DoS) to the…
PoC exploit for critical FortiSIEM vulnerability released (CVE-2025-64155)
A critical vulnerability (CVE-2025-64155) in Fortinet’s FortiSIEM security platform has now been accompanied by publicly released proof-of-concept (PoC) exploit code, raising the urgency for organizations to patch immediately. About CVE-2025-64155 CVE-2025-64155 may allow unauthenticated, remote attackers to execute unauthorized code or commands on vulnerable FortiSIEM deployments via specially crafted TCP requests. “This flaw targets the phMoni…
DoS attacks can endanger the operation of Palo Alto firewalls. Security patches are available for download.
Palo Alto Fixes GlobalProtect DoS Flaw That Can Crash Firewalls Without Login
Palo Alto Networks has released security updates for a high-severity security flaw impacting GlobalProtect Gateway and Portal, for which it said there exists a proof-of-concept (PoC) exploit. The vulnerability, tracked as CVE-2026-0227 (CVSS score: 7.7), has been described as a denial-of-service (DoS) condition impacting GlobalProtect PAN-OS software arising as a result of an improper check for
Coverage Details
Bias Distribution
- 100% of the sources are Center
Factuality
To view factuality data please Upgrade to Premium




