TROYANOSYVIRUS
Voltar para CVEs

CVE-2025-0111

MEDIUMCISA KEV
6.5

Descricao

An authenticated file read vulnerability in the Palo Alto Networks PAN-OS software enables an authenticated attacker with network access to the management web interface to read files on the PAN-OS filesystem that are readable by the “nobody” user. You can greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended best practices deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 . This issue does not affect Cloud NGFW or Prisma Access software.

Detalhes CVE

Pontuacao CVSS v3.16.5
SeveridadeMEDIUM
Vetor CVSSCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Vetor de ataqueNETWORK
ComplexidadeLOW
Privilegios necessariosLOW
Interacao do usuarioNONE
Publicado2/12/2025
Ultima modificacao11/4/2025
Fontekev
Avistamentos honeypot0

CISA KEV

FornecedorPalo Alto Networks
ProdutoPAN-OS
Nome da vulnerabilidadePalo Alto Networks PAN-OS File Read Vulnerability
Data inclusao KEV2025-02-20
Prazo de remediacao2025-03-13
Uso em ransomwareUnknown

Produtos afetados

paloaltonetworks:pan-os

Fraquezas (CWE)

CWE-73CWE-610

Correlacoes IOC

Sem correlacoes registradas

This product uses data from the NVD API but is not endorsed or certified by the NVD.