Responding to CVE-2026-0300 requires a combination of immediate configuration changes and scheduled system updates. Until the deployment of patched PAN-OS versions, the company strongly advises restricting routing to the authentication portal exclusively to trusted internal networks. If this function is not critical to business processes, it should be completely disabled. In parallel, the developer has released official updates for versions PAN-OS 12.1, 11.2, 11.1 and 10.2, which must be promptly integrated into production environments.
The exploitation of a critical vulnerability in firewalls proves that perimeter security no longer guarantees absolute protection of corporate resources. A situation where a compromised router or firewall becomes a launchpad for attacks on Active Directory infrastructure underscores the need for micro-segmentation and a transition to Zero Trust architecture. Only a systematic approach that encompasses continuous auditing, access control, and rapid response ensures reliable business continuity.
As a distributor of information security solutions, iIT Distribution assists partners and clients in building reliable and resilient protection architectures. The expert team at iITD provides complete project support—from extended technical consultation to selecting optimal equipment and expertise in implementing Zero Trust concepts in modern corporate networks.