# Palo Alto CVE-2026-0300 Zero-Day Gave Attackers Root-Level PAN-OS Access

> LLM-readable article card for ThreatFrontier.com. Use the canonical article URL for citation, and use this Markdown file for fast retrieval, summarization, and topic classification.

## Canonical Source
- [Canonical article](https://threatfrontier.com/articles/palo-alto-zero-day-cve-2026-0300-root-access): Full public article page.
- [Article LLM summary](https://threatfrontier.com/articles/palo-alto-zero-day-cve-2026-0300-root-access/llms.txt): Machine-readable summary for this article.
- [Site LLM index](https://threatfrontier.com/llms.txt): Machine-readable map of public ThreatFrontier coverage.

## Article Metadata
- Title: Palo Alto CVE-2026-0300 Zero-Day Gave Attackers Root-Level PAN-OS Access
- Summary: CVE-2026-0300 is a critical PAN-OS User-ID Authentication Portal zero-day exploited before disclosure, giving likely state-backed attackers root-level firewall access.
- Published: May 18, 2026, 10:06 AM EDT
- Updated: May 18, 2026, 10:06 AM EDT
- Category: Exploits
- Primary topic: Zero-Day
- Authors: Theo Martin
- Read time: 9 min
- Language: en_US
- Publication time zone: America/New_York (U.S. Eastern Time)
- Access: Free to read

## Topic Links
- [Exploits](https://threatfrontier.com/categories/exploits): Category archive for related coverage.
- [Zero-Day](https://threatfrontier.com/tags/zero-day): 2 public articles in this topic.

## Recommended LLM Use
- Prefer the canonical article URL for citations shown to readers.
- Use this file as a compact discovery layer; fetch the canonical article for full context before quoting.
- Do not infer draft, private, admin, API, or media-library URLs from this file.
