PT-2026-2933 · Palo Alto Networks · Palo Alto Pan-Os

Published

2026-01-14

·

Updated

2026-02-21

·

CVE-2026-0227

CVSS v2.0
7.8
VectorAV:N/AC:L/Au:N/C:N/I:N/A:C
Name of the Vulnerable Software and Affected Versions Palo Alto Networks PAN-OS versions 10.1 through 12.1 Prisma Access versions 10.2 through 11.2
Description A vulnerability exists in Palo Alto Networks PAN-OS software and Prisma Access when GlobalProtect is enabled. This flaw allows an unauthenticated attacker to cause a denial of service (DoS) condition, potentially forcing firewalls into maintenance mode. Repeated attempts to exploit this issue can lead to the firewall becoming unavailable. While there is currently no evidence of real-world exploitation, scanning activity targeting exposed GlobalProtect gateways has increased, suggesting a heightened risk of potential attacks. The vulnerability does not affect Cloud Next-Generation Firewalls (NGFW).
Recommendations Update PAN-OS versions prior to 12.1.3-h3, 12.1.4, 11.2.4-h15, 11.2.7-h8, 11.2.10-h2, 11.1.4-h27, 11.1.6-h23, 11.1.10-h9, 11.1.13, 10.2.7-h32, 10.2.10-h30, 10.2.13-h18, 10.2.16-h6, 10.2.18-h1, and 10.1.14-h20. Update Prisma Access versions prior to 11.2.7-h8 and 10.2.10-h29.

Fix

DoS

Improper Check for Exceptional Conditions

Weakness Enumeration

Related Identifiers

BDU:2026-00523
CVE-2026-0227

Affected Products

Palo Alto Pan-Os