TROYANOSYVIRUS
Retour aux CVEs

CVE-2025-0108

CRITICALCISA KEV
9.1

Description

An authentication bypass in the Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to bypass the authentication otherwise required by the PAN-OS management web interface and invoke certain PHP scripts. While invoking these PHP scripts does not enable remote code execution, it can negatively impact integrity and confidentiality of PAN-OS. You can greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended best practices deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 . This issue does not affect Cloud NGFW or Prisma Access software.

Details CVE

Score CVSS v3.19.1
SeveriteCRITICAL
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisNONE
Interaction utilisateurNONE
Publie2/12/2025
Derniere modification11/4/2025
Sourcekev
Observations honeypot0

CISA KEV

FournisseurPalo Alto Networks
ProduitPAN-OS
Nom vulnerabilitePalo Alto Networks PAN-OS Authentication Bypass Vulnerability
Date ajout KEV2025-02-18
Date limite remediation2025-03-11
Utilise dans ransomwareUnknown

Produits affectes

paloaltonetworks:pan-os

Faiblesses (CWE)

CWE-306CWE-306

Correlations IOC

Aucune correlation enregistree

This product uses data from the NVD API but is not endorsed or certified by the NVD.