Palo Alto PAN-OS Multiple vulnerabilities

Multiple vulnerabilities were identified in Palo Alto PAN-OS . A remote attacker could exploit some of these vulnerabilities to trigger remote code execution, data manipulation and security restriction bypass on the targeted system.

 

Note:

Exploit in the wild has been detected for CVE-2025-0108 that enables an unauthenticated attacker with network access to the management web interface to bypass the authentication otherwise required by the PAN-OS management web interface and invoke certain PHP scripts. Hence, the risk level is rated as High Risk.

 

[Updated on 2025-02-19]

Updated Description and Risk level changed to high.

RISK: High Risk

TYPE: Security software and application – Security Software & Appliance

TYPE: Security Software & Appliance

Impact

  • Remote Code Execution
  • Data Manipulation
  • Security Restriction Bypass

System / Technologies affected

  • PAN-OS 10.1 versions earlier than PAN-OS 10.1.14-h9
  • PAN-OS 10.2 versions earlier than PAN-OS 10.2.13-h3
  • PAN-OS 11.1 versions earlier than PAN-OS 11.1.6-h1
  • PAN-OS 11.2 versions earlier than PAN-OS 11.2.4-h4
  • PAN-OS OpenConfig Plugin versions earlier than 2.1.2

Solutions

Before installation of the software, please visit the vendor web-site for more details.

 

Apply fixes issued by the vendor:


Vulnerability Identifier


Source


Related Link

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.