Zero-day vulnerability in Palo Alto Networks firewall exploited since April

Summary: Hackers allegedly backed by states exploited a zero-day remote code execution (RCE) vulnerability in PAN-OS since April 9, affecting PA-Series and VM-Series firewalls.

Zero-day vulnerability in PAN-OS firewalls allows remote code execution and is actively exploited

A new critical remote code execution (RCE) vulnerability in devices running PAN-OS, the operating system for Palo Alto Networks firewalls, has been actively exploited since at least April 9, according to an investigation published by BleepingComputer.

The flaw poses a serious threat to organizations using enterprise firewalls exposed to the internet, as it could allow attackers to compromise perimeter devices responsible for protecting entire corporate networks.

What is known about the vulnerability

According to the report, attackers are leveraging a zero-day vulnerability that affects PAN-OS before many organizations could apply mitigations or security patches.

The exploitation would allow:

  • remote code execution,
  • authentication bypass,
  • taking control of the firewall,
  • access to corporate traffic,
  • lateral movement within internal networks.

Researchers observed active exploitation attempts on publicly exposed systems and noted that the attacks began weeks before public disclosure.

Why are firewalls such critical targets

Enterprise firewalls occupy a privileged position within any infrastructure:

  • inspect incoming and outgoing traffic,
  • manage corporate VPNs,
  • handle authentication,
  • apply security policies,
  • protect internal services.

When an attacker compromises a perimeter firewall, they potentially gain:

  • total traffic visibility,
  • privileged access to internal segments,
  • persistence capability,
  • opportunities for espionage or ransomware.

This is why vulnerabilities in security appliances quickly become priority targets for APT groups and ransomware operators.

Increase in attacks against security appliances

In recent years, there has been a constant growth in attacks directed against:

  • enterprise VPNs,
  • firewalls,
  • SSL gateways,
  • MDM solutions,
  • remote access systems.

Recent cases affecting Ivanti, Fortinet, Citrix, and now PAN-OS demonstrate that attackers prioritize internet-exposed security devices due to their enormous strategic value.

What organizations must do

Experts recommend acting immediately:

  • apply the patches published by Palo Alto Networks,
  • restrict administrative access from the internet,
  • review logs and suspicious activity,
  • enable MFA on administrative access,
  • segment critical devices,
  • monitor VPN connections and anomalous traffic,
  • look for indicators of compromise (IoCs).

It is also advised to conduct full audits on publicly exposed PAN-OS devices, even if patched, due to the possibility of prior compromise.

The risk of zero-days in critical infrastructure

This incident once again highlights a growing problem in modern cybersecurity: devices designed to protect networks are becoming some of the most exploited targets by sophisticated attackers.

The combination of:

  • privileged access,
  • direct exposure to the internet,
  • software complexity,
  • massive enterprise deployments,

makes corporate firewalls an extremely attractive target for espionage, information theft, and ransomware campaigns.

Key facts

  • The flaw allows remote code execution (RCE) with root privileges.
  • The exploitation was detected on PA-Series and VM-Series firewalls.
  • The attackers used Earthworm and ReverseSocks5 to maintain access.
  • The vulnerability was exploited starting April 9, 2026.

Why it matters

This exploitation represents a significant security risk because it allows unauthenticated attackers to take total control of enterprise-level firewalls. The persistence in the exploitation suggests sophisticated compromise and the potential for disrupting critical infrastructure.

X profile@BleepinComputerhttps://twitter.com/BleepinComputer
Embedded content for: Zero-day vulnerability in Palo Alto Networks firewall exploited since April