Skip to content
Briefings are running a touch slower this week while we rebuild the foundations.See roadmap
Cybersecurity: Threats and Defences
30APR

CISA deadline for PAN-OS RCE lands four days early

3 min read
08:16UTC

CISA added CVE-2026-0300 to the Known Exploited Vulnerabilities catalogue on 6 May with a 9 May federal deadline. Palo Alto Networks will not ship a patch until 13 May, the first documented instance of a KEV deadline arriving before the vendor fix exists.

TechnologyDeveloping
Key takeaway

A KEV deadline arriving four days before the vendor patch exposes the compliance programme's foundational assumption.

CISA added CVE-2026-0300 to its Known Exploited Vulnerabilities (KEV) catalogue on Wednesday 6 May, setting a federal remediation deadline of Saturday 9 May.1 The flaw is an unauthenticated remote code execution (RCE) vulnerability in Palo Alto Networks PAN-OS firewalls, carrying a Common Vulnerability Scoring System (CVSS) score of 9.3 and triggered by a crafted packet to the User-ID Authentication Portal (the captive portal used for guest-network access).2 Palo Alto's own advisory states first patches will not ship until Wednesday 13 May, four days after the federal deadline.3 That four-day gap is without documented precedent in the KEV programme's history.

Federal Chief Information Security Officers face a binary. They can restrict the User-ID portal to trusted zones and disable Response Pages (the official mitigation), or they can document non-compliance. Neither constitutes a patch. The compliance machinery the programme runs on was built on the implicit assumption that a vendor fix precedes or accompanies a KEV listing. That assumption has now failed in writing, for the first time.

CISA's three-day remediation cadence, applied to Cisco Catalyst SD-WAN Manager in April and embedded in the multi-agency deadline doctrine from the IOC advisory , appears to have been applied reflexively here, without accounting for a case where no fix yet exists. Private-sector organisations that use KEV listings as a contractual service-level basis face the same structural problem in their procurement and insurance frameworks. The deadline lands on paper regardless of whether the vendor has shipped.

Deep Analysis

In plain English

CISA is the US government agency that tells federal departments which software flaws to fix, and by when. When a flaw appears on its KEV list, government agencies must fix it by the deadline or formally document why they cannot. In this case, CISA set a 9 May deadline for a critical flaw in Palo Alto's PAN-OS firewall software. But Palo Alto itself said it would not have the fix ready until 13 May. That is four days after the deadline. This has never happened before on record. Agencies are legally required to patch but physically cannot, because the patch does not exist. The only option is to apply a workaround, not a fix, and document that. The case exposes a gap in how the rules are written: the rules assumed the vendor would always have a patch ready by the time the deadline was set.

Deep Analysis
Root Causes

CISA's KEV programme operates on a policy assumption that is now exposed in print: that a vendor will have shipped, or will ship within hours, a patch for any vulnerability already under active exploitation. The Binding Operational Directive 22-01 (November 2021) sets no minimum patch-availability criterion before a deadline can be issued.

The underlying structural cause is a co-ordination gap between CISA's KEV publication pipeline and vendor patch release cycles. Large enterprise vendors such as Cisco and Fortinet have structured CERT relationships with CISA that create informal pre-publication alignment. Palo Alto Networks has such a relationship, but the CVE-2026-0300 timeline suggests the patch schedule was not factored into the deadline-setting process before publication.

The second cause is the legal architecture of KEV itself: it is a federal mandate, not a recommendation. Agencies cannot defer or document-and-skip without formal non-compliance record. The programme was designed for accountability, not flexibility, and that design leaves no compliant path when the vendor fix does not exist.

What could happen next?
  • Precedent

    CISA will be under pressure to add a vendor-patch-availability check to the KEV publication workflow, which may slow future KEV additions for complex enterprise products.

    Short term · 0.7
  • Risk

    Private-sector organisations using KEV as a contractual SLA face ambiguous insurance posture for the nine days between the deadline and the patch ship date.

    Immediate · 0.8
  • Consequence

    Federal CISOs must now maintain a documented record of deadline-before-patch non-compliance, which creates a legally visible audit trail that future administrations or inspectors general may scrutinise.

    Medium term · 0.75
First Reported In

Update #3 · CISA's deadline outruns Palo Alto's patch

CISA· 8 May 2026
Read original
Different Perspectives
Norwegian Security and Service Organisation
Norwegian Security and Service Organisation
NSSO was a prior victim of Ivanti EPMM zero-days and now faces CVE-2026-6973 in the same product line. Ivanti's position that on-premises EPMM is the only affected tier provides limited reassurance to a government body that has already been compromised twice via the same vendor's MDM infrastructure.
ENISA and EU CNA Ecosystem
ENISA and EU CNA Ecosystem
ENISA onboarded four new CVE Numbering Authorities under ENISA Root on 6 May, expanding EU-sovereign vulnerability disclosure infrastructure in the same week three critical CVEs entered the CISA KEV catalogue. Greater CNA coverage inside the EU reduces dependence on US-anchored MITRE for European-sourced vulnerability identifiers.
German Federal Office for Information Security (BSI)
German Federal Office for Information Security (BSI)
BSI rated CVE-2026-41940 in cPanel 'very high', reflecting Germany's exposure across shared-hosting infrastructure for Mittelstand businesses. The 65-day zero-day window and the amplification effect of cPanel's multi-tenancy model mean the BSI rating applies to thousands of German SME websites hosted on affected servers.
Republic of Korea National Intelligence Service
Republic of Korea National Intelligence Service
South Korea's NIS tracks UNC1069's tooling evolution; the CSIS paper argues the ROK's intelligence on DPRK cyber operations should feed joint US-ROK situational awareness rather than bilateral channels that move too slowly for real-time supply-chain response.
Democratic People's Republic of Korea
Democratic People's Republic of Korea
UNC1069's Axios operation scales North Korea's supply-chain access from niche Python packages to the most downloaded HTTP client in the JavaScript ecosystem. WAVESHAPER.V2 provides persistent access to development environments where cryptocurrency wallets and API keys are stored, serving the sanctions-evasion funding logic behind earlier DPRK toolchain operations.
WatchTowr Labs
WatchTowr Labs
WatchTowr Labs disclosed CVE-2026-41940 after the 28 April patch shipped, providing the 65-day exploitation timeline from KnownHost telemetry. The disclosure is textbook; the open question is why WebPros did not catch the cpsrvd CRLF class flaw before external researchers found it under active exploitation.