CRITICALZero Day
Verified
Global

Critical Zero-Day in Palo Alto PAN-OS Firewalls Under Active Mass Exploitation

Tuesday, March 31, 2026 at 06:00 PM UTC·Source: Palo Alto Networks PSIRT

Updated: Wednesday, April 1, 2026 at 08:00 AM UTC

Executive Summary

A critical unauthenticated RCE in PAN-OS GlobalProtect is being mass exploited. Over 25,000 devices vulnerable. CISA issues emergency directive.

Analysis

Palo Alto Networks has confirmed active exploitation of CVE-2026-0015, a critical command injection vulnerability in the GlobalProtect gateway. Unauthenticated attackers can execute arbitrary commands as root via crafted HTTPS requests. Volexity first observed exploitation on March 26 with rapid escalation. CISA issued Emergency Directive 26-02 requiring federal agencies to patch within 48 hours.

Timeline

Discovered
Mar 26, 2026
Exploitation Detected
Mar 26, 2026
Published
Mar 31, 2026
Patch Available
Mar 30, 2026

Indicators of Compromise (1)

CVE (1)
CVE-2026-0015
Source Attribution

Originally published by Palo Alto Networks PSIRT on Mar 31, 2026. Verified by: CISA, Palo Alto Networks, Volexity.

Related Threats