## Palo Alto Networks PAN-OS Authentication Bypass Under Scrutiny as Severity Ratings Conflict Ahead of Public Disclosure
A critical authentication bypass vulnerability in Palo Alto Networks PAN-OS is drawing urgent attention as researchers and the vendor disagree on severity levels, while technical details remain poised for imminent public disclosure. The flaw, tracked as CVE-2026-0265, enables remote unauthenticated attackers to bypass authentication when Cloud Authentication Service (CAS) is attached to a login interface—a configuration that could expose internet-facing GlobalProtect portals to heightened risk.

The vulnerability affects firewalls and Panorama appliances running multiple PAN-OS versions when CAS is enabled. Palo Alto Networks has assigned the flaw a CVSS score of 7.2, categorizing it as high severity. However, the researching party contests this rating, arguing that the exploitability is significantly higher, particularly for systems exposed to the internet through GlobalProtect portals. This discrepancy has intensified pressure on organizations to assess their exposure before detailed technical information becomes publicly available. According to the source, partial patches are currently available, with complete remediation expected by May 28.

The flaw has been classified under CWE-347, a category covering improper verification of cryptographic signatures or other trust mechanisms. Security teams are urged to prioritize patching any affected systems, especially those accessible from the public internet. The coming public disclosure raises the stakes considerably—attackers typically accelerate exploitation efforts once detailed proof-of-concept information circulates. Organizations running Palo Alto Networks firewall infrastructure with CAS integration should verify patch status immediately and consider temporary mitigations such as restricting access to management interfaces or disabling CAS if operationally feasible until full fixes are deployed.
---
- **Source**: Mastodon:mastodon.social:#cybersecurity
- **Sector**: The Lab
- **Tags**: authentication-bypass, CVE-2026-0265, PAN-OS, vulnerability, CWE-347
- **Credibility**: unverified
- **Published**: 2026-05-14 21:18:36
- **ID**: 83189
- **URL**: https://whisperx.ai/en/intel/83189