<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[🚨 [CISA-2026:0506] CISA Adds One Known Exploited Vulnerability to Catalog (https:&#x2F;&#x2F;secdb.nttzen.cloud&#x2F;security-advisory&#x2F;detail&#x2F;CISA-2026:0506)]]></title><description><![CDATA[<p><img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f6a8.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--rotating_light" style="height:23px;width:auto;vertical-align:middle" title="🚨" alt="🚨" /> [CISA-2026:0506] CISA Adds One Known Exploited Vulnerability to Catalog (<a href="https://secdb.nttzen.cloud/security-advisory/detail/CISA-2026:0506" rel="nofollow noopener"><span>https://</span><span>secdb.nttzen.cloud/security-ad</span><span>visory/detail/CISA-2026:0506</span></a>)</p><p>CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.</p><p><img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/26a0.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--warning" style="height:23px;width:auto;vertical-align:middle" title="⚠" alt="⚠" />️ CVE-2026-0300 (<a href="https://secdb.nttzen.cloud/cve/detail/CVE-2026-0300" rel="nofollow noopener"><span>https://</span><span>secdb.nttzen.cloud/cve/detail/</span><span>CVE-2026-0300</span></a>)<br />- Name: Palo Alto Networks PAN-OS Out-of-bounds Write Vulnerability<br />- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.    Until the vendor releases an official fix, the following workaround should be implemented:  - Restrict User-ID Authentication Portal access to only trusted zones.  - Disable User-ID Authentication Portal if not required.<br />- Known To Be Used in Ransomware Campaigns? Unknown<br />- Vendor: Palo Alto Networks<br />- Product: PAN-OS<br />- Notes: <a href="https://security.paloaltonetworks.com/CVE-2026-0300" rel="nofollow noopener"><span>https://</span><span>security.paloaltonetworks.com/</span><span>CVE-2026-0300</span></a> ; <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-0300" rel="nofollow noopener"><span>https://</span><span>nvd.nist.gov/vuln/detail/CVE-2</span><span>026-0300</span></a></p><p><a href="https://infosec.exchange/tags/SecDB" rel="tag">#<span>SecDB</span></a> <a href="https://infosec.exchange/tags/InfoSec" rel="tag">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/CVE" rel="tag">#<span>CVE</span></a> <a href="https://infosec.exchange/tags/CISA_KEV" rel="tag">#<span>CISA_KEV</span></a> <a href="https://infosec.exchange/tags/cisa_20260506" rel="tag">#<span>cisa_20260506</span></a> <a href="https://infosec.exchange/tags/cisa20260506" rel="tag">#<span>cisa20260506</span></a> <a href="https://infosec.exchange/tags/cve_2026_0300" rel="tag">#<span>cve_2026_0300</span></a> <a href="https://infosec.exchange/tags/cve20260300" rel="tag">#<span>cve20260300</span></a></p>]]></description><link>https://board.circlewithadot.net/topic/0ce0e849-2bc0-47ac-9a9b-44dd1576122b/cisa-2026-0506-cisa-adds-one-known-exploited-vulnerability-to-catalog-https-secdb.nttzen.cloud-security-advisory-detail-cisa-2026-0506</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 05:05:51 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/0ce0e849-2bc0-47ac-9a9b-44dd1576122b.rss" rel="self" type="application/rss+xml"/><pubDate>Wed, 06 May 2026 20:00:16 GMT</pubDate><ttl>60</ttl></channel></rss>