CISA added CVE-2026-0300 to its Known Exploited Vulnerabilities (KEV) catalogue on Wednesday 6 May, setting a federal remediation deadline of Saturday 9 May.1 The flaw is an unauthenticated remote code execution (RCE) vulnerability in Palo Alto Networks PAN-OS firewalls, carrying a Common Vulnerability Scoring System (CVSS) score of 9.3 and triggered by a crafted packet to the User-ID Authentication Portal (the captive portal used for guest-network access).2 Palo Alto's own advisory states first patches will not ship until Wednesday 13 May, four days after the federal deadline.3 That four-day gap is without documented precedent in the KEV programme's history.
Federal Chief Information Security Officers face a binary. They can restrict the User-ID portal to trusted zones and disable Response Pages (the official mitigation), or they can document non-compliance. Neither constitutes a patch. The compliance machinery the programme runs on was built on the implicit assumption that a vendor fix precedes or accompanies a KEV listing. That assumption has now failed in writing, for the first time.
CISA's three-day remediation cadence, applied to Cisco Catalyst SD-WAN Manager in April and embedded in the multi-agency deadline doctrine from the IOC advisory , appears to have been applied reflexively here, without accounting for a case where no fix yet exists. Private-sector organisations that use KEV listings as a contractual service-level basis face the same structural problem in their procurement and insurance frameworks. The deadline lands on paper regardless of whether the vendor has shipped.
