Vulnerability Description
An authentication bypass vulnerability in Palo Alto Networks PAN-OS® software enables an unauthenticated attacker with network access to bypass authentication controls when Cloud Authentication Service (CAS) is enabled. The risk is higher if CAS is enabled on the management interface and lower when any other login interfaces are used. The risk of this issue is greatly reduced if you secure access to the management web interface by restricting access to only trusted internal IP addresses according to our recommended best practice deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 . This issue is applicable to PAN-OS software on PA-Series and VM-Series firewalls and on Panorama (virtual and M-Series). Cloud NGFW and Prisma Access® are not impacted by this vulnerability.
Related Weaknesses (CWE)
References
FAQ
What is CVE-2026-0265?
CVE-2026-0265 is a documented vulnerability. An authentication bypass vulnerability in Palo Alto Networks PAN-OS® software enables an unauthenticated attacker with network access to bypass authentication controls when Cloud Authentication Servic...
How severe is CVE-2026-0265?
CVSS scoring is not yet available for CVE-2026-0265. Check NVD for updates.
Is there a patch for CVE-2026-0265?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.