CVE-2025-0108
Severity CVSS v4.0:
HIGH
Type:
CWE-306
Missing Authentication for Critical Function
Publication date:
12/02/2025
Last modified:
17/04/2025
Description
An authentication bypass in the Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to bypass the authentication otherwise required by the PAN-OS management web interface and invoke certain PHP scripts. While invoking these PHP scripts does not enable remote code execution, it can negatively impact integrity and confidentiality of PAN-OS.<br />
<br />
You can greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended best practices deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 .<br />
<br />
This issue does not affect Cloud NGFW or Prisma Access software.
Impact
Base Score 4.0
8.80
Severity 4.0
HIGH
Base Score 3.x
9.10
Severity 3.x
CRITICAL
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:* | 10.1.0 (including) | 10.1.14 (excluding) |
cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:* | 10.2.0 (including) | 10.2.7 (excluding) |
cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:* | 10.2.10 (including) | 10.2.12 (excluding) |
cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:* | 11.2.0 (including) | 11.2.4 (excluding) |
cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:-:*:*:*:*:*:* | ||
cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h1:*:*:*:*:*:* | ||
cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h2:*:*:*:*:*:* | ||
cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h3:*:*:*:*:*:* | ||
cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h4:*:*:*:*:*:* | ||
cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h5:*:*:*:*:*:* | ||
cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h6:*:*:*:*:*:* | ||
cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h7:*:*:*:*:*:* | ||
cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h8:*:*:*:*:*:* | ||
cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:-:*:*:*:*:*:* | ||
cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h1:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://security.paloaltonetworks.com/CVE-2025-0108
- https://github.com/iSee857/CVE-2025-0108-PoC
- https://slcyber.io/blog/nginx-apache-path-confusion-to-auth-bypass-in-pan-os/
- https://www.bleepingcomputer.com/news/security/palo-alto-networks-tags-new-firewall-bug-as-exploited-in-attacks/
- https://www.darkreading.com/remote-workforce/patch-now-cisa-researchers-warn-palo-alto-flaw-exploited-wild
- https://www.securityweek.com/palo-alto-networks-confirms-exploitation-of-firewall-vulnerability/
- https://www.theregister.com/2025/02/19/palo_alto_firewall_attack/