PT-2025-6776 · Palo Alto Networks · Pan-Os

Maxime Gaudreault

+1

·

Published

2025-02-12

·

Updated

2025-03-09

·

CVE-2025-0111

CVSS v4.0
7.1
VectorAV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/AU:N/R:U/V:C/RE:M/U:Red
Name of the Vulnerable Software and Affected Versions Palo Alto Networks PAN-OS (affected versions not specified)
Description An authenticated file read vulnerability in the Palo Alto Networks PAN-OS software enables an authenticated attacker with network access to the management web interface to read files on the PAN-OS filesystem that are readable by the
nobody
user. This issue does not affect Cloud NGFW or Prisma Access software. The vulnerability is actively exploited in attacks.
Recommendations As a temporary workaround, consider restricting access to the management web interface to only trusted internal IP addresses according to the recommended best practices deployment guidelines. At the moment, there is no information about a newer version that contains a fix for this vulnerability.

Weakness Enumeration

Related Identifiers

BDU:2025-02463
CVE-2025-0111

Affected Products

Pan-Os