CVE-2025-4614

2.7 LOW

📋 TL;DR

An authenticated administrator in Palo Alto Networks PAN-OS software can view session tokens of users logged into the firewall web UI, potentially enabling impersonation of those users. This affects PAN-OS firewalls with web UI access, but not Cloud NGFW or Prisma Access. The risk is significantly reduced when CLI access is restricted to a limited group of administrators.

💻 Affected Systems

Products:
  • Palo Alto Networks PAN-OS
Versions: Specific affected versions not specified in provided description
Operating Systems: PAN-OS
Default Config Vulnerable: ⚠️ Yes
Notes: Cloud NGFW and Prisma Access are NOT affected. Risk is minimized when CLI access is restricted to limited administrators.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated malicious administrator could steal session tokens and impersonate other users, potentially gaining unauthorized access to sensitive firewall configurations or performing actions as other users.

🟠

Likely Case

Accidental or intentional viewing of session tokens by authorized administrators, with limited exploitation due to existing authentication requirements and administrative controls.

🟢

If Mitigated

Minimal risk when proper access controls are implemented, particularly restricting CLI access to trusted administrators only.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated administrator access to the firewall web UI.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific fixed versions

Vendor Advisory: https://security.paloaltonetworks.com/CVE-2025-4614

Restart Required: Yes

Instructions:

1. Review vendor advisory for affected versions. 2. Download and apply the appropriate PAN-OS patch. 3. Restart the firewall to apply changes. 4. Verify the patch is applied successfully.

🔧 Temporary Workarounds

Restrict CLI Access

all

Limit CLI access to a small group of trusted administrators to minimize the risk of token exposure.

Configure role-based access control to restrict CLI permissions

🧯 If You Can't Patch

  • Implement strict role-based access control to limit administrative access
  • Monitor administrator activity logs for unusual session token access patterns

🔍 How to Verify

Check if Vulnerable:

Check PAN-OS version against vendor advisory for affected versions

Check Version:

show system info

Verify Fix Applied:

Verify PAN-OS version is updated to a version not listed as vulnerable in the vendor advisory

📡 Detection & Monitoring

Log Indicators:

  • Unusual administrator access to session management functions
  • Multiple user sessions from single administrator account

Network Indicators:

  • Unexpected authentication attempts using known session tokens

SIEM Query:

Search for administrator account accessing session token data or unusual user impersonation patterns

🔗 References

📤 Share & Export