PT-2025-6473 · Palo Alto Networks · Pan-Os

Adam Kues

·

Published

2025-02-12

·

Updated

2025-12-30

·

CVE-2025-0108

CVSS v4.0
8.8
VectorAV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:U/V:C/RE:M/U:Red
Name of the Vulnerable Software and Affected Versions Palo Alto Networks PAN-OS (affected versions not specified)
Description An authentication bypass vulnerability exists in Palo Alto Networks PAN-OS, allowing an unauthenticated attacker with network access to the management web interface to bypass authentication and invoke certain PHP scripts. While invoking these scripts does not enable remote code execution, it can negatively impact the integrity and confidentiality of PAN-OS. Active exploitation of this vulnerability has been observed, with over 3,500 interfaces exposed, primarily in Asia and North America. The vulnerability is due to a path confusion issue between Nginx and Apache. A proof-of-concept exploit is publicly available.
Recommendations At the moment, there is no information about a newer version that contains a fix for this vulnerability.

Exploit

RCE

DoS

Missing Authentication

Weakness Enumeration

Related Identifiers

BDU:2025-01567
CVE-2025-0108
PANOS_CVE2025_0108

Affected Products

Pan-Os