CVE-2025-0108

9.1 CRITICAL CISA KEV

📋 TL;DR

An authentication bypass vulnerability in Palo Alto Networks PAN-OS software allows unauthenticated attackers with network access to the management web interface to bypass authentication and invoke certain PHP scripts. This can compromise system integrity and confidentiality by allowing unauthorized access to sensitive functions. The vulnerability affects PAN-OS firewalls with exposed management interfaces.

💻 Affected Systems

Products:
  • Palo Alto Networks PAN-OS
Versions: Multiple PAN-OS versions (specific range not provided in CVE description)
Operating Systems: PAN-OS (custom OS)
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with network-accessible management web interface. Cloud NGFW and Prisma Access are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain unauthorized administrative access to firewall management, potentially modifying configurations, extracting sensitive data, or disrupting network security controls.

🟠

Likely Case

Attackers access sensitive configuration data, audit logs, or system information that could facilitate further attacks or reconnaissance.

🟢

If Mitigated

Limited impact due to restricted management interface access, with attackers unable to reach the vulnerable endpoint.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploits are publicly available and confirmed to be used in attacks. The vulnerability requires network access to the management interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific fixed versions

Vendor Advisory: https://security.paloaltonetworks.com/CVE-2025-0108

Restart Required: Yes

Instructions:

1. Check current PAN-OS version. 2. Review vendor advisory for fixed versions. 3. Apply appropriate PAN-OS update. 4. Restart firewall to apply changes.

🔧 Temporary Workarounds

Restrict Management Interface Access

all

Limit access to PAN-OS management interface to trusted internal IP addresses only

Configure firewall rules to restrict management interface access to specific IP ranges

🧯 If You Can't Patch

  • Immediately restrict management interface access to trusted internal IP addresses only
  • Implement network segmentation to isolate management interfaces from untrusted networks

🔍 How to Verify

Check if Vulnerable:

Check if PAN-OS management interface is accessible from untrusted networks and if running an affected version

Check Version:

Check PAN-OS version in web interface or via CLI: show system info

Verify Fix Applied:

Verify PAN-OS version is updated to patched version and management interface access is properly restricted

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated access attempts to management interface PHP scripts
  • Unusual authentication bypass patterns

Network Indicators:

  • Traffic to management interface from unexpected sources
  • Requests to specific PHP scripts without authentication

SIEM Query:

Search for unauthenticated requests to PAN-OS management interface containing PHP script paths

🔗 References

📤 Share & Export