Palo Alto Networks has patched a significant security vulnerability in its PAN-OS software, categorized as CVE-2025-0108, that could allow an authentication bypass. This flaw, with a CVSS score of 7.8, enables unauthorized users network access to the management web interface. Although it does not permit remote code execution, it threatens the integrity and confidentiality of the system. Additionally, two other vulnerabilities, CVE-2025-0109 and CVE-2025-0110, have also been addressed, focusing on file deletion and command injection respectively, highlighting the importance of timely updates for security.
"An authentication bypass in the Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to bypass the authentication otherwise required by the PAN-OS management web interface and invoke certain PHP scripts."
"While invoking these PHP scripts does not enable remote code execution, it can negatively impact the integrity and confidentiality of PAN-OS."
"The vulnerability affects the following versions - PAN-OS 11.2 < 11.2.4-h4 (Fixed in >= 11.2.4-h4), PAN-OS 11.1 < 11.1.6-h1 (Fixed in >= 11.1.6-h1)."
"CVE-2025-0109 is an unauthenticated file deletion vulnerability in the management web interface that enables an attacker to delete certain files as the 'nobody' user."
Collection
[
|
...
]