No items found.
February 14, 2025
·
0
Minutes Read

PAN-OS: Authentication Bypass in the Management Web Interface Disclosed andPatched

Advisory
February 14, 2025
·
0
Minutes Read

PAN-OS: Authentication Bypass in the Management Web Interface Disclosed andPatched

This is some text inside of a div block.
This is some text inside of a div block.
·
0
Minutes Read
Kudelski Security Team
Find out more
table of contents
Share on
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Summary

A recently discovered vulnerability, CVE-2025-0108, in Palo Alto Networks PAN-OS, allows an unauthenticated attacker with network access to bypass authentication and access the management web interface from which an attacker can also invoke specific PHP scripts. Although this doesn’t lead to remote code execution, it can compromise the integrity and confidentiality of the system.

In order to mitigate risk, Palo Alto recommends that access to the management interface be restricted to trusted internal IP addresses. Palo Alto confirms that a viable solution for affected PAN-OS versions is to upgrade to later PAN-OS versions. This issue does not affect Cloud NGFW or Prisma Access software, and Palo Alto Networks is not aware of any malicious exploitation of this issue.

Affected Systems and/or Applications

  • PAN-OS 10.1.14 and prior
  • PAN-OS 10.2.13 and prior
  • PAN-OS 11.0 (EoL) Upgrade to a supported fixed version
  • PAN-OS 11.1.6 and prior
  • PAN-OS 11.2.4 and prior

Mitigation/Solution

Palo Alto recommends that access to the management interface be restricted to trusted internal IP addresses in accordance with best practices. Patched versions are available as well for the following PAN-OS versions :

  • PAN-OS 10.1 Upgrade to 10.1.14-h9 or later
  • PAN-OS 10.2 Upgrade to 10.2.13-h3 or later
  • PAN-OS 11.0 (EoL) Upgrade to a supported fixed version
  • PAN-OS 11.1 Upgrade to 11.1.6-h1 or later
  • PAN-OS 11.2 Upgrade to 11.2.4-h4 or later

What the Cyber Fusion Center is Doing

The CFC will continue to monitor the situation and send an advisory update if needed. Clients subscribed to our vulnerability scan services will receive relevant results if critical vulnerabilities are found within the scope of the scans as soon as a relevant plugin is made available by the scan provider.

References

Related Post