Authentication bypass in PAN-OS management web interface



| Updated: 2025-02-21
Risk High
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2025-0108
CWE-ID CWE-306
Exploitation vector Network
Public exploit Vulnerability #1 is being exploited in the wild.
Vulnerable software
Palo Alto PAN-OS
Operating systems & Components / Operating system

Vendor Palo Alto Networks, Inc.

Security Bulletin

This security bulletin contains one high risk vulnerability.

1) Missing Authentication for Critical Function

EUVDB-ID: #VU103926

Risk: High

CVSSv4.0: 8.8 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:A/U:Amber]

CVE-ID: CVE-2025-0108

CWE-ID: CWE-306 - Missing Authentication for Critical Function

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to gain unauthorized access to the system.

The vulnerability exists due to missing authorization in web management interface. A remote non-authenticated attacker can request directly certain PHP scripts to bypass authentication process and gain unauthorized access to the system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Palo Alto PAN-OS: 10.1 - 11.2.4

CPE2.3 External links

http://security.paloaltonetworks.com/CVE-2025-0108


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

Yes. This vulnerability is being exploited in the wild.



###SIDEBAR###