Cyber Posture

CVE-2026-0227

High

Published: 15 January 2026

Published
15 January 2026
Modified
06 February 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score 0.0003 9.8th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-0227 is a high-severity Improper Check for Unusual or Exceptional Conditions (CWE-754) vulnerability in Paloaltonetworks Pan-Os. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Application or System Exploitation (T1499.004); ranked at the 9.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Application or System Exploitation (T1499.004).
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-754

Requires detection and response to audit logging failures as an unusual or exceptional condition.

addresses: CWE-754

Implements detection of unusual or exceptional conditions followed by safe mode entry, reducing the window for exploitation of unchecked conditions.

addresses: CWE-754

Training ensures users perform required checks for unusual or exceptional conditions as part of contingency roles, limiting attacker leverage from skipped validations.

addresses: CWE-754

IR testing directly validates checks for unusual or exceptional conditions that could indicate security incidents.

addresses: CWE-754

Requires ongoing monitoring of organization-defined metrics and analysis, enabling checks for unusual or exceptional conditions.

addresses: CWE-754

Security testing routinely checks for unusual or exceptional inputs/conditions, identifying missing validation steps that flaw remediation then resolves.

addresses: CWE-754

Requires detection of unusual conditions followed by a controlled transition to the defined failure state.

addresses: CWE-754

MTTF determination forces explicit checks for conditions that precede predictable component failure.

MITRE ATT&CK Enterprise TechniquesAI

T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

Direct remote exploitation of software vulnerability to crash/impair firewall availability and force maintenance mode.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

A vulnerability in Palo Alto Networks PAN-OS software enables an unauthenticated attacker to cause a denial of service (DoS) to the firewall. Repeated attempts to trigger this issue results in the firewall entering into maintenance mode.

Deeper analysisAI

CVE-2026-0227 is a vulnerability in Palo Alto Networks PAN-OS software that enables an unauthenticated attacker to cause a denial of service (DoS) condition on the firewall. Repeated attempts to trigger the issue can force the firewall into maintenance mode. The vulnerability is associated with CWE-754 and carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H), indicating high availability impact with no effects on confidentiality or integrity.

An unauthenticated attacker with network access to the affected firewall can exploit this vulnerability remotely with low complexity and no requirement for user interaction or privileges. Successful exploitation disrupts firewall operations, and sustained attacks lead to the device entering maintenance mode, rendering it unavailable for traffic processing.

Mitigation details and patches are available in the vendor advisory at https://security.paloaltonetworks.com/CVE-2026-0227, published on 2026-01-15. Security practitioners should consult this reference for specific remediation steps.

Details

CWE(s)

Affected Products

paloaltonetworks
pan-os
10.1.14, 10.2.10, 10.2.13, 10.2.16, 10.2.17 · 10.1.0 — 10.1.14 · 10.2.0 — 10.2.7 · 10.2.8 — 10.2.10
paloaltonetworks
prisma access
all versions

CVEs Like This One

CVE-2025-0114Same product: Paloaltonetworks Pan-Os
CVE-2025-0111Same product: Paloaltonetworks Pan-Os
CVE-2025-0108Same product: Paloaltonetworks Pan-Os
CVE-2026-0300Same product: Paloaltonetworks Pan-Os
CVE-2025-0118Same product class: VPN / SSL gateway
CVE-2026-0109Shared CWE-754
CVE-2026-4686Shared CWE-754
CVE-2026-33939Shared CWE-754
CVE-2026-4706Shared CWE-754
CVE-2026-25639Shared CWE-754

References