TROYANOSYVIRUS
Retour aux CVEs

CVE-2025-0111

MEDIUMCISA KEV
6.5

Description

An authenticated file read vulnerability in the Palo Alto Networks PAN-OS software enables an authenticated attacker with network access to the management web interface to read files on the PAN-OS filesystem that are readable by the “nobody” user. You can greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended best practices deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 . This issue does not affect Cloud NGFW or Prisma Access software.

Details CVE

Score CVSS v3.16.5
SeveriteMEDIUM
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisLOW
Interaction utilisateurNONE
Publie2/12/2025
Derniere modification11/4/2025
Sourcekev
Observations honeypot0

CISA KEV

FournisseurPalo Alto Networks
ProduitPAN-OS
Nom vulnerabilitePalo Alto Networks PAN-OS File Read Vulnerability
Date ajout KEV2025-02-20
Date limite remediation2025-03-13
Utilise dans ransomwareUnknown

Produits affectes

paloaltonetworks:pan-os

Faiblesses (CWE)

CWE-73CWE-610

Correlations IOC

Aucune correlation enregistree

This product uses data from the NVD API but is not endorsed or certified by the NVD.