CVE-2025-0108:
An authentication bypass in Palo Alto Networks PAN-OS management web interface enables an unauthenticated attacker with network access to bypass login and invoke certain PHP scripts, potentially compromising integrity and confidentiality. The issue does not grant remote code execution and is most risky when the management interface is exposed to untrusted networks; affected PAN-OS versions span multiple 10.x and 11.x releases, while Cloud NGFW and Prisma Access are not affected. Fixes have been released for specific PAN-OS builds; administrators should apply the recommended upgrades and restrict management access.
Score
A numerical rating that indicates how dangerous this vulnerability is.
9.1Critical- Published Date:Feb 12, 2025
- CISA KEV Date:Feb 18, 2025
- Industries Affected:20
Threat Predictions
- EPSS Score:94.1
- EPSS Percentile:100%
Exploitability
- Score:3.9
- Attack Vector:NETWORK
- Attack Complexity:LOW
- Privileges Required:NONE
- User Interaction:NONE
- Scope:UNCHANGED
Impact
- Score:5.2
- Confidentiality Impact:HIGH
- Integrity Impact:HIGH
- Availability Impact:NONE
Description Preview
An authentication bypass in Palo Alto Networks PAN-OS management web interface enables an unauthenticated attacker with network access to bypass login and invoke certain PHP scripts, potentially compromising integrity and confidentiality. The issue does not grant remote code execution and is most risky when the management interface is exposed to untrusted networks; affected PAN-OS versions span multiple 10.x and 11.x releases, while Cloud NGFW and Prisma Access are not affected. Fixes have been released for specific PAN-OS builds; administrators should apply the recommended upgrades and restrict management access.
Overview
CVE-2025-0108 is a PAN-OS authentication bypass vulnerability that permits an unauthenticated network-based attacker to bypass management web interface authentication and trigger certain PHP scripts, potentially exposing PAN-OS to integrity and confidentiality risks. The flaw does not enable remote code execution. The highest risk occurs when management access is reachable from the internet or untrusted networks. Affected products include PAN-OS across multiple versions; Cloud NGFW and Prisma Access are not impacted. Fixed versions include upgrades to 10.1.14-h9 or later, 10.2.13-h3 or later, 11.1.6-h1 or later, and 11.2.4-h4 or later, with additional interim fixes for certain subversions. The issue is tracked under CWE-306 Missing Authentication for Critical Function.
Remediation
- Apply the fixed PAN-OS builds (for example, 10.1.14-h9 or later; 10.2.13-h3 or later; 11.1.6-h1 or later; 11.2.4-h4 or later; note EoL status for older branches) as outlined by Palo Alto Networks. In addition to patching, immediately reduce exposure by restricting management interface access to trusted internal IP addresses, and consider using a jump box or out-of-band management path to prevent internet-facing access. Follow vendor best practices for securing administrative access, and be aware that some releases (e.g., PAN-OS 11.0) are EoL and no longer receive fixes. If available, enable Threat Prevention features and monitor for exploitation attempts.
References
- - https://security.paloaltonetworks.com/CVE-2025-0108
- - https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-0108
- - https://www.theregister.com/2025/02/19/palo_alto_firewall_attack/
- - https://slcyber.io/blog/nginx-apache-path-confusion-to-auth-bypass-in-pan-os/
- - https://www.darkreading.com/remote-workforce/patch-now-cisa-researchers-warn-palo-alto-flaw-exploited-wild
- - https://www.securityweek.com/palo-alto-networks-confirms-exploitation-of-firewall-vulnerability/
- - https://www.bleepingcomputer.com/news/security/palo-alto-networks-tags-new-firewall-bug-as-exploited-in-attacks/
- - https://github.com/iSee857/CVE-2025-0108-PoC
Armis Early Warning
Armis Early Warning provides proactive threat intelligence and early detection capabilities.Click here to learn more.
- Armis Alert Date:Feb 17, 2025
- CISA KEV Date:Feb 18, 2025
- Days Early:6 Days
Industries Affected
Below is a list of industries most commonly impacted or potentially at risk based on intelligence.