PT-2026-2933 · Palo Alto Networks · Palo Alto Pan-Os
Published
2026-01-14
·
Updated
2026-02-21
·
CVE-2026-0227
CVSS v2.0
7.8
7.8
High
| Base vector | Vector | AV:N/AC:L/Au:N/C:N/I:N/A:C |
Name of the Vulnerable Software and Affected Versions
Palo Alto Networks PAN-OS versions 10.1 through 12.1
Prisma Access versions 10.2 through 11.2
Description
A vulnerability exists in Palo Alto Networks PAN-OS software and Prisma Access when GlobalProtect is enabled. This flaw allows an unauthenticated attacker to cause a denial of service (DoS) condition, potentially forcing firewalls into maintenance mode. Repeated attempts to exploit this issue can lead to the firewall becoming unavailable. While there is currently no evidence of real-world exploitation, scanning activity targeting exposed GlobalProtect gateways has increased, suggesting a heightened risk of potential attacks. The vulnerability does not affect Cloud Next-Generation Firewalls (NGFW).
Recommendations
Update PAN-OS versions prior to 12.1.3-h3, 12.1.4, 11.2.4-h15, 11.2.7-h8, 11.2.10-h2, 11.1.4-h27, 11.1.6-h23, 11.1.10-h9, 11.1.13, 10.2.7-h32, 10.2.10-h30, 10.2.13-h18, 10.2.16-h6, 10.2.18-h1, and 10.1.14-h20.
Update Prisma Access versions prior to 11.2.7-h8 and 10.2.10-h29.
Fix
DoS
Improper Check for Exceptional Conditions
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
BDU:2026-00523
CVE-2026-0227
Affected Products
Palo Alto Pan-Os
References · 50
- https://nvd.nist.gov/vuln/detail/CVE-2026-0227 · Security Note
- https://security.paloaltonetworks.com/CVE-2025-4620 · Vendor Advisory
- https://bdu.fstec.ru/vul/2026-00523 · Security Note
- https://reddit.com/r/secithubcommunity/comments/1qdfotm/palo_alto_fixes_globalprotect_dos_flaw_that_can · Reddit Post
- https://twitter.com/hackeraffairs/status/2012554946357723380 · Twitter Post
- https://twitter.com/jbhall56/status/2011793835911684444 · Twitter Post
- https://reddit.com/r/SecOpsDaily/comments/1qeiab1/cve20260227_palo_alto_networks_fixes · Reddit Post
- https://twitter.com/ThreatSynop/status/2012197483523215390 · Twitter Post
- https://twitter.com/eyalestrin/status/2011795820342100303 · Twitter Post
- https://twitter.com/HackingRabbitS/status/2012661417137045703 · Twitter Post
- https://twitter.com/0xT3chn0m4nc3r/status/2011740333663465665 · Twitter Post
- https://twitter.com/NetSecIO/status/2012240590713266270 · Twitter Post
- https://t.me/cveNotify/151161 · Telegram Post
- https://twitter.com/ThreatSynop/status/2012251656080040198 · Twitter Post
- https://twitter.com/NovaSignal/status/2011841461252473156 · Twitter Post