Cyber Threat Brief — May 6 2026

⚠️ This report is AI-generated. Always validate findings.

1. PAN-OS Captive Portal Pre-Auth Root RCE — CVE-2026-0300

TL;DR: Unauthenticated heap buffer overflow in PAN-OS User-ID Authentication Portal gives root RCE on PA-Series and VM-Series firewalls. Actively exploited against internet-exposed portals; patches roll out May 13–28.

What’s New:

  • CVSS 9.3 (CVSS-BT 4.0) — pre-auth, network-reachable, root-level code execution
  • Affects PAN-OS 10.2, 11.1, 11.2, 12.1 across PA-Series and VM-Series; Prisma Access and Cloud NGFW not impacted
  • Limited exploitation confirmed against internet-exposed User-ID Authentication Portals
  • Palo Alto released Threat Prevention signature (PAN-OS 11.1+) on May 5 to detect exploitation attempts
  • Patched releases staggered May 13–28 depending on branch (12.1.4-h5, 11.2.4-h17, 11.1.4-h33, 10.2.7-h34, etc.)

Actionable Intel

ArtifactTypeATT&CKLog SourceAction
POST to /php/uid.cgi with oversized payloadExploit attemptT1190PAN-OS Threat logs / URL filteringEnable Threat Prevention signature; monitor for signature hits
Anomalous mgmtsrvr or pan_authd child processesPost-exploitationT1059PAN-OS system logsHunt for unexpected shell spawns from auth portal processes
Outbound connections from management plane to unknown IPsC2T1071PAN-OS traffic logs / firewall egressAlert on mgmt-plane-initiated outbound connections
User-ID Auth Portal exposed to 0.0.0.0/0Attack surfaceT1190Shodan / config auditRestrict portal access to trusted IPs immediately

Detection

SourceRuleGap
Splunk ESCUNoneNo PAN-OS Captive Portal–specific exploit detection; rely on Threat Prevention sig + generic web server shell spawn
ElasticNoneNo coverage; custom rule needed for PAN-OS system log anomalies
SigmaNoneNo rule; community contribution needed for PAN-OS auth portal exploitation patterns

Sources: Palo Alto Advisory · The Hacker News · SOCRadar · Help Net Security


2. Weaver E-cology Debug API Unauthenticated RCE — CVE-2026-22679

TL;DR: Unauthenticated RCE via exposed Dubbo debug endpoint in Weaver E-cology 10.0 (CVSS 9.8). Exploited in the wild since March 17 with PowerShell cradles, MSI payloads, and Goby-linked C2 at 152.32.173.138.

What’s New:

  • Exploit hits POST /papi/esearch/data/devops/dubboApi/debug/method — attacker-controlled interfaceName/methodName params reach OS command execution with no auth
  • Vega Research traced earliest exploitation to March 17, five days after patch shipped (build 20260312)
  • Payloads observed: vsgbt.exe, hjchhb.exe via PowerShell download cradle; nvm.exe via encoded PS; fanwei0324.msi via msiexec
  • Defense evasion: attacker copied signed powershell.exe to 2.txt to bypass process-name detections
  • All attacker processes parented by java.exe (Weaver’s Tomcat JVM) with no preceding authentication

Actionable Intel

ArtifactTypeATT&CKLog SourceAction
POST /papi/esearch/data/devops/dubboApi/debug/methodExploit URIT1190WAF / web access logsBlock or alert on requests to this endpoint
152.32.173.138 (Goby C2)C2 IPT1071Firewall / proxy logsBlock at perimeter
vsgbt.exe, hjchhb.exe, nvm.exeDropped payloadsT1059.001EDR / SysmonHunt for these filenames; collect hashes if present
fanwei0324.msiMSI payloadT1218.007Sysmon EventID 1 / EDRAlert on msiexec.exe loading unknown MSI from temp paths
java.execmd.exewhoami/ipconfig/tasklistDiscovery chainT1057, T1016Sysmon / EDR process treeAlert on Java spawning shell with recon commands
powershell.exe copied to 2.txtEvasionT1036.003Sysmon FileCreate / EDRAlert on PE files written with non-exe extensions

Detection

SourceRuleGap
Splunk ESCUWeb or Application Server Spawning a Shell (generic)No Weaver-specific rule; generic Java→shell rule partially covers post-exploitation
ElasticNoneNo coverage for Weaver E-cology; custom web log rule needed for debug endpoint
SigmaSuspicious Java Process Spawning Shell (generic)Covers java.exe → shell chain; no URI-specific rule for the Dubbo debug path

Sources: The Hacker News · Vega Research · BleepingComputer · GitHub PoC


Status Updates

  • CVE-2026-31431 (Linux kernel — Copy Fail): CISA KEV deadline May 15 approaching; Kubernetes container-escape PoC now public (Percivalll/Copy-Fail-Kubernetes-PoC); Go and Rust reimplementations detected in the wild. Patch or disable algif_aead module. Original brief.
  • CVE-2024-1708/1709 (ScreenConnect): Storm-1175/Medusa campaigns ongoing; federal deadline May 12. Original brief.