Back to Articles
critical

Palo Alto GlobalProtect Zero-Day Exploited in Targeted Attacks...

A critical zero-day in Palo Alto Networks GlobalProtect VPN is being exploited by suspected nation-state actors targeting defense contractors.

By Danny Mercer, CISSP — Lead Security Analyst Feb 2, 2026

Executive Summary

Palo Alto Networks issued an emergency advisory warning customers that attackers are actively exploiting CVE-2026-0001, a critical zero-day in GlobalProtect VPN (CVSS 9.8). The flaw allows unauthenticated RCE against vulnerable appliances. Volexity attributes attacks to UTA0218, targeting defense industrial base organizations.

Technical Analysis

The vulnerability exists in the GlobalProtect portal and gateway components. Specially crafted packets to the SSL VPN interface trigger a buffer overflow, achieving root-level code execution without credentials. Attackers deploy LITTLELAMB backdoor through modified system services.

Remediation

Apply hotfixes for PAN-OS 10.2, 11.0, and 11.1 immediately. Disable device telemetry and limit portal access to known IPs until patched.

References

Concerned about this threat?

Our security team can assess your exposure and recommend immediate actions.

Get a Free Assessment →