TROYANOSYVIRUS
Voltar para CVEs

CVE-2025-0108

CRITICALCISA KEV
9.1

Descricao

An authentication bypass in the Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to bypass the authentication otherwise required by the PAN-OS management web interface and invoke certain PHP scripts. While invoking these PHP scripts does not enable remote code execution, it can negatively impact integrity and confidentiality of PAN-OS. You can greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended best practices deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 . This issue does not affect Cloud NGFW or Prisma Access software.

Detalhes CVE

Pontuacao CVSS v3.19.1
SeveridadeCRITICAL
Vetor CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Vetor de ataqueNETWORK
ComplexidadeLOW
Privilegios necessariosNONE
Interacao do usuarioNONE
Publicado2/12/2025
Ultima modificacao11/4/2025
Fontekev
Avistamentos honeypot0

CISA KEV

FornecedorPalo Alto Networks
ProdutoPAN-OS
Nome da vulnerabilidadePalo Alto Networks PAN-OS Authentication Bypass Vulnerability
Data inclusao KEV2025-02-18
Prazo de remediacao2025-03-11
Uso em ransomwareUnknown

Produtos afetados

paloaltonetworks:pan-os

Fraquezas (CWE)

CWE-306CWE-306

Correlacoes IOC

Sem correlacoes registradas

This product uses data from the NVD API but is not endorsed or certified by the NVD.