Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsPalo Alto Networks Warns of DoS Bug Letting Hackers Disable Firewalls
Palo Alto Networks Warns of DoS Bug Letting Hackers Disable Firewalls
Cybersecurity

Palo Alto Networks Warns of DoS Bug Letting Hackers Disable Firewalls

•January 15, 2026
0
BleepingComputer
BleepingComputer•Jan 15, 2026

Companies Mentioned

Palo Alto Networks

Palo Alto Networks

PANW

GreyNoise

GreyNoise

Why It Matters

A successful exploit could silently knock out critical perimeter defenses, exposing enterprises to broader attacks and operational downtime. Prompt patching is essential to maintain network resilience and compliance for the 70,000‑plus customers relying on Palo Alto’s security stack.

Key Takeaways

  • •CVE‑2026‑0227 enables unauthenticated DoS on PAN‑OS firewalls.
  • •Affects PAN‑OS 10.1+ and Prisma Access with GlobalProtect enabled.
  • •Palo Alto issued patches; most cloud instances already updated.
  • •Shadowserver lists ~6,000 exposed Palo Alto firewalls online.
  • •No active exploitation reported, but risk remains high.

Pulse Analysis

The newly disclosed CVE‑2026‑0227 underscores how a single code path can render next‑generation firewalls ineffective. By exploiting a malformed request, an unauthenticated actor can force PAN‑OS devices into maintenance mode, stripping away intrusion prevention, URL filtering, and other core controls. This type of denial‑of‑service vulnerability is especially dangerous because it does not require credential theft; it merely needs network reachability to the management interface, a scenario common in mis‑configured remote‑access deployments.

Palo Alto Networks moved quickly to issue firmware updates across the PAN‑OS 10.1‑12.1 line and Prisma Access versions. The company reports that the majority of cloud‑based Prisma Access customers have already received the fix, while on‑premise installations are being scheduled according to each organization’s upgrade window. The rapid response mirrors earlier patches for high‑profile zero‑day exploits in 2024‑2025, reinforcing Palo Alto’s commitment to a disciplined patch‑management cadence. Nonetheless, the lingering presence of roughly 6,000 firewalls exposed on the internet, as highlighted by Shadowserver, signals that many enterprises still lag in baseline hardening and asset visibility.

For security leaders, the episode serves as a reminder to prioritize continuous vulnerability scanning, especially for GlobalProtect portals that expose VPN services to the public internet. Integrating automated patch deployment tools, enforcing strict change‑management policies, and conducting regular penetration tests can mitigate the window of exposure. As the market leans toward zero‑trust architectures, ensuring that firewall firmware remains current is a non‑negotiable pillar of enterprise resilience, protecting both data centers and cloud workloads from disruptive attacks.

Palo Alto Networks warns of DoS bug letting hackers disable firewalls

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...