Nation-state threat actors are increasingly targeting network edge infrastructure-particularly firewalls and authentication portals-to achieve stealthy and high-impact compromises. Recent intelligence from Palo Alto Networks Unit 42 and public reporting highlights how a suspected state-sponsored cluster, CL-STA-1132, has actively exploited a critical PAN-OS zero-day vulnerability to gain unauthenticated root-level access and maintain covert persistence.
This campaign reflects a broader trend in modern cyber operations: weaponizing edge devices with minimal noise, leveraging zero-day vulnerabilities combined with stealth-focused post-exploitation techniques to enable long-term espionage and lateral movement.
Background on CL-STA-1132 Activity
CL-STA-1132 is a likely state-sponsored threat cluster tracked by Unit 42, engaged in targeted exploitation of high-value infrastructure.
Unlike traditional opportunistic attacks, this campaign emphasizes:
- Stealth-driven intrusion techniques
- Use of zero-day exploits for initial access
- Rapid log evasion and forensic cleanup
- Reliance on open-source tooling instead of custom malware
The activity aligns with broader nation-state espionage operations, where attackers prioritize long-term access and intelligence collection over immediate disruption.
This campaign demonstrates a highly targeted and controlled exploitation effort focused on enterprise perimeter defenses.
Primary Targets
- Enterprise environments using Palo Alto PAN-OS firewalls
- Organizations with internet-exposed Captive Portal (User-ID Authentication Portal)
- Critical infrastructure and enterprise networks relying on perimeter security devices
Vulnerability Details
- Vulnerability: Unauthenticated Remote Code Execution (Pre-Auth) – Buffer Overflow
- CVSS Score: 9.3 (Critical)
- EPSS Score: 5.29%
- Affected Products: Palo Alto Networks PAN-OS
- Affected Versions:
- PAN-OS 12.1: <12.1.4-h5, <12.1.7.
- PAN-OS 11.2: <11.2.4-h17, <11.2.7-h13, <11.2.10-h6, <11.2.12.
- PAN-OS 11.1: <11.1.4-h33, <11.1.6-h32, <11.1.7-h6, <11.1.10-h25, <11.1.13-h5, <11.1.15.
- PAN-OS 10.2: <10.2.7-h34, <10.2.10-h36, <10.2.13-h21, <10.2.16-h7, <10.2.18-h6.
- Patch: Apply vendor patches as soon as available (This issue will be fixed in upcoming releases of PAN-OS.)
Tactics and Techniques
- TA0001 – Initial Access: Exploitation of public-facing Captive Portal via crafted packets
- TA0002 – Execution: Shellcode execution within nginx worker process
- TA0006 – Credential Access: Extraction of credentials via compromised firewall
- TA0008 – Lateral Movement: Use of stolen credentials to access internal systems
- TA0040 – Impact Avoidance (Defense Evasion): Systematic log deletion and crash artifact cleanup
Indicators of Compromise (IOCs)
Network Indicators
- 67.206.213[.]86
- 136.0.8[.]48
- 146.70.100[.]69 (C2 Staging)
- 149.104.66[.]84
- hxxp[:]//146.70.100[.]69:8000/php_sess (EarthWorm Download)
- hxxps[:]//github[.]com/Acebond/ReverseSocks5/releases/download/v2.2.0/ReverseSocks5-v2.2.0-linux-amd64.tar[.]gz (ReverseSocks5 Download)
Malware / Impact Indicators
- EarthWorm tunneling tool (SHA256):
e11f69b49b6f2e829454371c31ebf86893f82a042dae3f2faf63dcd84f97a584 - ReverseSocks5 tunneling tool deployment
Infection Method
Initial Access
Attackers exploited the PAN-OS Captive Portal vulnerability (CVE-2026-0300) by sending specially crafted network packets to internet-exposed firewalls. No authentication was required, making this a pre-auth remote exploit.
Exploitation
Successful exploitation allowed attackers to:
- Execute arbitrary commands as root
- Inject shellcode into firewall processes
- Gain full control over the affected device
Payload Delivery
- Rather than deploying heavy malware, attackers used: EarthWorm (network tunneling tool) and ReverseSocks5 (proxy tunneling utility)
- This approach: Reduced forensic footprint and blended activity with legitimate system behavior
Execution & Persistence
Persistence was achieved through:
- Continued control of compromised firewall
- Use of legitimate services and credentials
- Avoidance of traditional persistence artifacts
Attackers avoided disk-based malware, relying instead on:
- Memory-based execution
- Native system capabilities
Command and Control (C2)
- Communication occurred through compromised firewall interfaces
- Leveraged tunneling tools for internal pivoting
- Used authenticated sessions to maintain control
Attack Flow
Initial Access (PAN-OS CVE-2026-0300 exploitation) -> Root-Level Exploitation (command execution & shellcode injection) -> Payload Delivery (EarthWorm, ReverseSocks5) ->Execution & Persistence (memory-based, legitimate access) -> Command and Control (firewall abuse and tunneling)
Mitigation Steps
- Restrict access to Captive Portal (trusted IPs only)
- Disable the portal if not required
- Apply vendor patches as soon as available
- Monitor for unusual firewall-originated traffic
- Enable advanced threat detection signatures
- Audit firewall configurations and exposure
Instantly Fix Risks with Saner Patch Management
Saner patch management is a continuous, automated, and integrated software that instantly fixes risks exploited in the wild. The software supports major operating systems like Windows, Linux, and macOS, as well as 550+ third-party applications.
It also allows you to set up a safe testing area to test patches before deploying them in a primary production environment. Saner patch management additionally supports a patch rollback feature in case of patch failure or a system malfunction.
Experience the fastest and most accurate patching software here.
