{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"PAN-OS versions 11.2.10-x ant\u00e9rieures \u00e0 11.2.10-h6","product":{"name":"PAN-OS","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"PAN-OS versions 10.2.18-x ant\u00e9rieures \u00e0 10.2.18-h6","product":{"name":"PAN-OS","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"PAN-OS versions 12.1.x ant\u00e9rieures \u00e0 12.1.7","product":{"name":"PAN-OS","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"PAN-OS versions 10.2.13-x ant\u00e9rieures \u00e0 10.2.13-h21","product":{"name":"PAN-OS","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"PAN-OS versions 10.2.7-x ant\u00e9rieures \u00e0 10.2.7-h34","product":{"name":"PAN-OS","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"PAN-OS versions 11.1.13-x ant\u00e9rieures \u00e0 11.1.13-h5","product":{"name":"PAN-OS","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"PAN-OS versions 11.1.6-x ant\u00e9rieures \u00e0 11.1.6-h32","product":{"name":"PAN-OS","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"PAN-OS versions 11.2.4-x ant\u00e9rieures \u00e0 11.2.4-h17","product":{"name":"PAN-OS","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"PAN-OS versions 10.2.16-x ant\u00e9rieures \u00e0 10.2.16-h7","product":{"name":"PAN-OS","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"PAN-OS versions 10.2.10-x ant\u00e9rieures \u00e0 10.2.10-h36","product":{"name":"PAN-OS","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"PAN-OS versions 11.1.x ant\u00e9rieures \u00e0 11.1.15","product":{"name":"PAN-OS","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"PAN-OS versions 11.1.4-x ant\u00e9rieures \u00e0 11.1.4-h33","product":{"name":"PAN-OS","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"PAN-OS versions 11.2.x ant\u00e9rieures \u00e0 11.2.12","product":{"name":"PAN-OS","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"PAN-OS versions 11.1.10-x ant\u00e9rieures \u00e0 11.1.10-h25","product":{"name":"PAN-OS","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"PAN-OS versions 12.1.4-x ant\u00e9rieures \u00e0 12.1.4-h5","product":{"name":"PAN-OS","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"PAN-OS versions 11.2.7-x ant\u00e9rieures \u00e0 11.2.7-h13","product":{"name":"PAN-OS","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"PAN-OS versions 11.1.7-x ant\u00e9rieures \u00e0 11.1.7-h6","product":{"name":"PAN-OS","vendor":{"name":"Palo Alto Networks","scada":false}}}],"affected_systems_content":"","content":"## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des correctifs (cf. section Documentation).","cves":[{"name":"CVE-2026-0300","url":"https://www.cve.org/CVERecord?id=CVE-2026-0300"}],"links":[],"reference":"CERTFR-2026-AVI-0537","revisions":[{"description":"Version initiale","revision_date":"2026-05-06T00:00:00.000000"}],"risks":[{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"}],"summary":"Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Palo Alto Networks User-ID Authentication Portal. Elle permet \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance.\n\nPalo Alto Networks indique que la vuln\u00e9rabilit\u00e9 CVE-2026-0300 est activement exploit\u00e9e.\n\nL'\u00e9diteur indique que les correctifs seront publi\u00e9s le 13 et le 28 mai 2026.","title":"Vuln\u00e9rabilit\u00e9 dans Palo Alto Networks User-ID Authentication Portal","vendor_advisories":[{"published_at":"2026-05-05","title":"Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2026-0300","url":"https://security.paloaltonetworks.com/CVE-2026-0300"}]}
