Critical Vulnerability in PAN-OS
19 January 2026
Palo Alto Networks has released security updates to address a high severity vulnerability affecting their PAN-OS product. Users and administrators of affected product versions are advised to update to the latest version immediately.
Background
Palo Alto Networks has released security updates to address a high severity vulnerability (CVE-2026-0227) affecting PAN-OS. The vulnerability have has a Common Vulnerability Scoring System (CVSS v3.1) score of 7.7 out of 10.
Impact
Successful exploitation of this vulnerability enables an unauthenticated attacker to cause a denial of service (DoS) to the firewall. Repeated attempts to trigger this issue results in the firewall entering into maintenance mode, which renders the firewall in a non-operative state, i.e. fail-closed. This issue is applicable only to configurations with an enabled GlobalProtect gateway or portal.
Affected Products
The vulnerability affects the following Palo Alto Networks software versions:
PAN-OS 12.1: Versions prior to 12.1.3-h3 or 12.1.4
PAN-OS 11.2: Versions prior to 11.2.4-h15, 11.2.7-h8, or 11.2.10-h2
PAN-OS 11.1: Versions prior to 11.1.4-h27, 11.1.6-h23, 11.1.10-h9, or 11.1.13
PAN-OS 10.2: Versions prior to 10.2.7-h32, 10.2.10-h30, 10.2.13-h18, 10.2.16-h6, or 10.2.18-h1
PAN-OS 10.1: Versions prior to 10.1.14-h20
Prisma Access 11.2: Versions prior 11.2.7-h8
Prisma Access 10.2: Versions prior 10.2.4-h43 or 10.2.10-h29
Known Exploitation
Exploit code for this vulnerability is reportedly available.
Recommendations
Users and administrators of affected product versions are advised to update to the latest versions immediately. For all older unsupported PAN-OS versions, upgrade to a supported fixed version.
References
