Palo Alto Networks warns of firewall RCE zero-day exploited in attacks
Palo Alto Networks warned customers today that a critical-severity unpatched vulnerability in the PAN-OS User-ID Authentication Portal is being exploited in attacks.
Grace Ops
triage-ready iocs + detections
fresh
1
IOC Workbench
typed indicators with fast copy and export actions
2 total
uhttps://www.bleepingcomputer.com/news/security/palo-alto-networks-warns-of-actively-exploited-firewall-zero-day/
dwww.bleepingcomputer.com
2 indicators staged for handoff.
2
Rule Studio
starter detections generated from this IOC set
2 formats
!Draft output: validate and tune before production rollout.
sigmadraft
title: AHackaday IOC starter detection
id: ahackaday-2026-05-06-palo-alto-networks-warns-of-firewall-rce-zero-day-exploited-in-attacks-fd852fdf
description: IOC starter rule for Palo Alto Networks warns of firewall RCE zero-day exploited in attacks
status: experimental
author: ahackaday
logsource:
product: network
detection:
selection_iocs:
- "https://www.bleepingcomputer.com/news/security/palo-alto-networks-warns-of-actively-exploited-firewall-zero-day/"
- "www.bleepingcomputer.com"
condition: selection_iocs
falsepositives:
- unknown
level: high
coverage
yaradraft
rule ahackaday_2026_05_06_palo_alto_networks_warns_of_firewall_rce_zero_day_exploited_in_attacks_fd852fdf
{
meta:
description = "IOC starter for Palo Alto Networks warns of firewall RCE zero-day exploited in attacks"
author = "ahackaday"
strings:
$ioc1 = "https://www.bleepingcomputer.com/news/security/palo-alto-networks-warns-of-actively-exploited-firewall-zero-day/" nocase
$ioc2 = "www.bleepingcomputer.com" nocase
condition:
any of them
}
coverage
3
Response Tracks
fast operational tracks from this incident snapshot
4 tracks
source-backed 1 refs
audit trail / provenance4
Provenance
Claims tie surfaced fields back to sources, models, or heuristics.
- severity.upliftheuristicn/aCVE or advisory identifiers detected — floor raised to at least high.
- severity.upliftheuristicn/aActive exploitation / in-the-wild language detected — floor raised to at least high.
- severity.upliftheuristicn/aRansomware campaign indicators detected — floor raised to at least high.
- severity.upliftheuristicn/aCombined zero-day/exploit + ransomware/mass-impact signals → critical.
What changed
Append-only revisions when ingest or analysts evolve the record.
No revision rows stored yet.
Sources
Curated May 06, 2026 by the ahackaday team./Sources verified./Brief grounded in 1 source.
discussion
Sign in to join the thread and vote on comments.
Loading comments…