CVE-2025-0111

6.5 MEDIUM CISA KEV

📋 TL;DR

An authenticated file read vulnerability in Palo Alto Networks PAN-OS software allows authenticated attackers with management web interface access to read files accessible by the 'nobody' user. This affects organizations running vulnerable PAN-OS versions with exposed management interfaces. Cloud NGFW and Prisma Access are not affected.

💻 Affected Systems

Products:
  • Palo Alto Networks PAN-OS
Versions: Specific versions not provided in input; check vendor advisory for affected versions
Operating Systems: PAN-OS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with management web interface accessible; Cloud NGFW and Prisma Access are NOT affected

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could read sensitive configuration files, credentials, or system files, potentially enabling further system compromise or data exfiltration.

🟠

Likely Case

Attackers with existing authenticated access could read non-critical system files, potentially gathering information for further attacks.

🟢

If Mitigated

With proper access controls, impact is limited to authorized users who already have legitimate access to the system.

🌐 Internet-Facing: HIGH - If management interface is exposed to the internet, attackers could exploit this after obtaining credentials.
🏢 Internal Only: MEDIUM - Requires authenticated access, but internal attackers or compromised accounts could exploit it.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated access to management interface; listed in CISA Known Exploited Vulnerabilities catalog

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific fixed versions

Vendor Advisory: https://security.paloaltonetworks.com/CVE-2025-0111

Restart Required: Yes

Instructions:

1. Check vendor advisory for affected versions 2. Apply latest PAN-OS update 3. Restart affected devices 4. Verify update was successful

🔧 Temporary Workarounds

Restrict Management Interface Access

all

Limit access to management web interface to trusted internal IP addresses only

Configure firewall rules to restrict management interface access to specific IP ranges

🧯 If You Can't Patch

  • Implement strict access controls to limit management interface to trusted IPs only
  • Monitor authentication logs for suspicious activity and implement multi-factor authentication

🔍 How to Verify

Check if Vulnerable:

Check PAN-OS version against vendor advisory for affected versions

Check Version:

show system info (from PAN-OS CLI)

Verify Fix Applied:

Verify PAN-OS version is updated to patched version listed in vendor advisory

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns from management interface
  • Multiple failed authentication attempts followed by successful login

Network Indicators:

  • Unexpected connections to management interface from unauthorized IPs
  • Unusual file read requests via management protocols

SIEM Query:

Search for authentication events from non-trusted IPs to PAN-OS management interface followed by file access patterns

🔗 References

📤 Share & Export