CVE-2025-0105

9.1 CRITICAL

📋 TL;DR

CVE-2025-0105 is an arbitrary file deletion vulnerability in Palo Alto Networks Expedition that allows unauthenticated attackers to delete files accessible to the www-data user on the host filesystem. This affects organizations using Expedition for migration and management of Palo Alto Networks firewalls. The vulnerability enables attackers to potentially disrupt services or achieve further compromise.

💻 Affected Systems

Products:
  • Palo Alto Networks Expedition
Versions: Specific versions not detailed in provided reference; check PAN-SA-2025-0001 for exact affected versions
Operating Systems: Linux-based systems where Expedition is deployed
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability affects Expedition deployments accessible to unauthenticated attackers; www-data user permissions determine scope of deletable files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through deletion of critical system files, service disruption, or deletion of configuration files enabling lateral movement.

🟠

Likely Case

Service disruption by deleting application files, logs, or configuration data, potentially leading to denial of service or operational impact.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent unauthenticated access to Expedition interfaces.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Unauthenticated access makes exploitation straightforward; specific exploit details not publicly available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check PAN-SA-2025-0001 for specific fixed versions

Vendor Advisory: https://security.paloaltonetworks.com/PAN-SA-2025-0001

Restart Required: Yes

Instructions:

1. Review PAN-SA-2025-0001 advisory. 2. Download and apply the latest Expedition patch from Palo Alto Networks support portal. 3. Restart Expedition services. 4. Verify patch application.

🔧 Temporary Workarounds

Network Access Restriction

linux

Restrict network access to Expedition management interface to trusted IP addresses only.

# Configure firewall rules to allow only trusted IPs to Expedition port (default 8443)
sudo iptables -A INPUT -p tcp --dport 8443 -s TRUSTED_IP -j ACCEPT
sudo iptables -A INPUT -p tcp --dport 8443 -j DROP

Service Isolation

linux

Run Expedition in a container or isolated environment with limited filesystem access.

# Example Docker run command with limited volume mounts
docker run -d --name expedition -p 8443:8443 -v /opt/expedition/config:/app/config paloaltonetworks/expedition

🧯 If You Can't Patch

  • Implement strict network segmentation and firewall rules to block all external access to Expedition management interface.
  • Monitor filesystem changes and implement file integrity monitoring (FIM) to detect unauthorized file deletions.

🔍 How to Verify

Check if Vulnerable:

Check Expedition version against affected versions listed in PAN-SA-2025-0001; if accessible without authentication and running vulnerable version, assume vulnerable.

Check Version:

Check Expedition web interface login page or application logs for version information; specific command varies by deployment.

Verify Fix Applied:

Verify Expedition version is updated to patched version per PAN-SA-2025-0001 and test that unauthenticated file deletion attempts are blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated access attempts to Expedition API endpoints
  • Unexpected file deletion events in system logs
  • www-data user performing file operations outside normal scope

Network Indicators:

  • Unusual outbound connections from Expedition host
  • Traffic to Expedition port (default 8443) from untrusted sources

SIEM Query:

source="expedition.log" AND (http_status=401 OR http_status=403) AND uri_path CONTAINS "/api/" AND user_agent NOT IN expected_agents

🔗 References

📤 Share & Export