If exploited, this vulnerability would cause Palo Alto Networks firewalls to stop processing traffic, effectively taking network security controls offline and potentially interrupting internet connectivity or inter-segment communication depending on deployment architecture. For organizations where PAN-OS devices sit in-line on critical network paths, a successful attack means operational downtime with no security inspection until the device recovers or is rebooted. While the vulnerability is rated medium severity and no exploitation has been observed, the zero-authentication requirement lowers the bar for any attacker with network adjacency.
You Are Affected If
You operate PAN-OS firewalls running version 10.2, 11.1, 11.2, or 12.1 in production
Affected PAN-OS devices are network-adjacent to untrusted segments, internet-facing, or reachable from guest or partner networks
You have not yet applied the CVE-2026-0262 fix for your specific PAN-OS branch (fixes for some branches remain pending per the vendor advisory)
You rely on Prisma Access and have not confirmed the 2026-05-15 proactive patch was applied to your tenant
Board Talking Points
A vulnerability in our Palo Alto Networks firewalls allows an attacker on the network to crash the device and knock out traffic inspection with no login required.
Security teams should apply vendor-issued patches to all affected firewall branches as they become available, prioritizing internet-facing and critical-path devices.
If unpatched devices are targeted, firewalls could go offline during an attack, leaving network segments without security controls until manually restored.