CVE-2025-0108

Published Feb 12, 2025

Last updated 2 months ago

Overview

AI description

Generated using AI and has not been reviewed by Intruder. May contain errors.

CVE-2025-0108 is an authentication bypass vulnerability found in the web management interface of Palo Alto Networks' PAN-OS firewall software. This vulnerability allows unauthenticated network access to bypass authentication and execute certain PHP scripts on affected devices. While this flaw doesn't directly permit remote code execution, it can compromise the integrity and confidentiality of the PAN-OS system. This vulnerability has been actively exploited in the wild.

Description
An authentication bypass in the Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to bypass the authentication otherwise required by the PAN-OS management web interface and invoke certain PHP scripts. While invoking these PHP scripts does not enable remote code execution, it can negatively impact integrity and confidentiality of PAN-OS. You can greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended best practices deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 . This issue does not affect Cloud NGFW or Prisma Access software.
Source
psirt@paloaltonetworks.com
NVD status
Modified

Insights

Analysis from the Intruder Security Team
Published Feb 13, 2025 Updated Feb 13, 2025

The mitigations that were put in place following the previous authentication bypass (CVE-2024-0012) were incomplete. The authentication step for the management panel can be abused to change the order of processing requests between various underlying technologies (apache, nginx, PHP), resulting in an auth bypass. AssetNote released a technical breakdown of this vulnerability.

Palo Alto have released patches for the vulnerability, details are available here

Risk scores

CVSS 4.0

Type
Secondary
Base score
8.8
Impact score
-
Exploitability score
-
Vector string
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:U/V:C/RE:M/U:Red
Severity
HIGH

CVSS 3.1

Type
Primary
Base score
9.1
Impact score
5.2
Exploitability score
3.9
Vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Severity
CRITICAL

Known exploits

Data from CISA

Vulnerability name
Palo Alto Networks PAN-OS Authentication Bypass Vulnerability
Exploit added on
Feb 18, 2025
Exploit action due
Mar 11, 2025
Required action
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Weaknesses

psirt@paloaltonetworks.com
CWE-306
nvd@nist.gov
CWE-306

Social media

Hype score
Not currently trending
  1. Palo Alto Networks published a security advisory for CVE-2025-0108, an authentication bypass vulnerability in the management web interface of PAN-OS. Find Arctic Wolf's recommendations. #EndCyberRisk https://t.co/DbjOipTarY

    @viktor_wiebe

    8 Apr 2025

    15 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  2. [1day1line] CVE-2025-0108: Authentication Bypass Vulnerability in PAN-OS via Nginx/Apache Path Confusion https://t.co/bR5DY2IdqC The vulnerability occurs due to the double URL decoding issue in the PAN-OS management interface, which processes requests through both Nginx and

    @hackyboiz

    3 Apr 2025

    638 Impressions

    5 Retweets

    12 Likes

    2 Bookmarks

    0 Replies

    0 Quotes

  3. Actively exploited CVE : CVE-2025-0108

    @transilienceai

    31 Mar 2025

    22 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  4. Actively exploited CVE : CVE-2025-0108

    @transilienceai

    31 Mar 2025

    36 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  5. Listen to "CVE-2025-0108 Root Cause Analysis: PAN-OS Authentication Bypass" by Tech Unplugged. https://t.co/LCvuI8rTHU

    @SublimeTechie

    12 Mar 2025

    2 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  6. Actively exploited CVE : CVE-2025-0108

    @transilienceai

    8 Mar 2025

    12 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  7. Actively exploited CVE : CVE-2025-0108

    @transilienceai

    5 Mar 2025

    25 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  8. Actively exploited CVE : CVE-2025-0108

    @transilienceai

    4 Mar 2025

    20 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  9. 🚨 ¡ALERTA DE SEGURIDAD! 🚨 Palo Alto Networks advierte sobre una vulnerabilidad crítica (CVE-2025-0108) que está siendo explotada activamente. 🔥 Si usas firewalls PAN-OS, ¡es urgente que leas esto! ⬇️ #CyberSecurity #Infosec https://t.co/ZaoAt5UAPd

    @C1B3R53CUR1TY

    3 Mar 2025

    47 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  10. Actively exploited CVE : CVE-2025-0108

    @transilienceai

    2 Mar 2025

    41 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  11. Actively exploited CVE : CVE-2025-0108

    @transilienceai

    1 Mar 2025

    28 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  12. Actively exploited CVE : CVE-2025-0108

    @transilienceai

    28 Feb 2025

    20 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  13. Actively exploited CVE : CVE-2025-0108

    @transilienceai

    28 Feb 2025

    16 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  14. Actively exploited CVE : CVE-2025-0108

    @transilienceai

    27 Feb 2025

    17 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  15. A recent advisory has revealed that the severity of the Palo Alto PAN-OS bug CVE-2025-0108 has been upgraded, as it allows unauthenticated attackers to exploit the web management interface in the wild. #CyberSecurity #Vulnerability https://t.co/CHp1Y7slnd

    @Cyber_O51NT

    27 Feb 2025

    93 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  16. There have been reports of active exploitation of a critical authentication bypass vulnerability (CVE-2025-0108) in Palo Alto Networks PAN-OS. Administrators of affected systems are strongly advised to update to the latest version immediately. https://t.co/ZlDL4IZeT3

    @CSAsingapore

    27 Feb 2025

    127 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  17. Actively exploited CVE : CVE-2025-0108

    @transilienceai

    26 Feb 2025

    25 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  18. Actively exploited CVE : CVE-2025-0108

    @transilienceai

    26 Feb 2025

    21 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  19. Actively exploited CVE : CVE-2025-0108

    @transilienceai

    25 Feb 2025

    21 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  20. Palo Alto Networks hat einen Sicherheitshinweis zu CVE-2025-0108 veröffentlicht, einer Authentifizierungsumgehungsschwachstelle in der Verwaltungsweboberfläche von PAN-OS. Hier finden Sie die Empfehlungen von Arctic Wolf. #EndCyberRisk https://t.co/oo4TnUoBQb

    @rfrumm

    25 Feb 2025

    6 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  21. Actively exploited CVE : CVE-2025-0108

    @transilienceai

    24 Feb 2025

    21 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  22. 🚨 🚨 WARNING: #CVE-2025-0108 Under Active Exploitation https://t.co/GU3xxl4Hua

    @UndercodeUpdate

    24 Feb 2025

    49 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  23. 🚨 High Security Vulnerability in Palo Alto Networks PAN-#OS (#CVE-2025-0108) https://t.co/a8EvAw276W

    @UndercodeUpdate

    24 Feb 2025

    38 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  24. https://t.co/Nqm37davkp #PaloAlto Networks warns that a file read #vulnerability (CVE-2025-0111) is now being chained in attacks with two other flaws (CVE-2025-0108 with CVE-2024-9474) to breach PAN-OS #firewalls in active attacks.

    @NSIguy

    23 Feb 2025

    4 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  25. Actively exploited CVE : CVE-2025-0108

    @transilienceai

    23 Feb 2025

    13 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  26. Actively exploited CVE : CVE-2025-0108

    @transilienceai

    22 Feb 2025

    23 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  27. 🚨 Palo Alto firewalls are under attack—again. Hackers are chaining three vulnerabilities (CVE-2025-0108, CVE-2024-9474, CVE-2025-0111) to gain root access. The attack is low complexity & actively exploited. Patch now! More details 👉 https://t.co/54s5KO5vRk #Cybersecurity

    @securityblvd

    22 Feb 2025

    130 Impressions

    1 Retweet

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  28. Threat Alert: Google Releases PoC for CVE-2025-0110 Command Injection in PAN-OS Firewalls CVE-2025-0110 CVE-2025-0109 CVE-2025-0108 Severity: ⚠️ Critical Maturity: 💥 Mainstream Learn more: https://t.co/23GBXF5IbZ #CyberSecurity #ThreatIntel #InfoSec (1/3)

    @fletch_ai

    22 Feb 2025

    49 Impressions

    0 Retweets

    0 Likes

    1 Bookmark

    1 Reply

    0 Quotes

  29. Actively exploited CVE : CVE-2025-0108

    @transilienceai

    22 Feb 2025

    13 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  30. Actively exploited CVE : CVE-2025-0108

    @transilienceai

    21 Feb 2025

    9 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  31. Palo Alto Networks warns of active exploitation of critical vulnerabilities CVE-2025-0108 and CVE-2025-0111 in PAN-OS firewalls. Immediate remediation is crucial to prevent remote code execution. 🔒🚨 #PaloAlto #Firewalls #USA link: https://t.co/Vu6LRj7MQ2 https://t.co/ojqlzun2W

    @TweetThreatNews

    21 Feb 2025

    15 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  32. Critical #vulnerability alert: CVE-2025-0108 in PAN-OS enables attackers to bypass authentication and compromise system integrity. Learn how to protect your organization in this #CybersecurityThreatAdvisory: https://t.co/G12na2ZurH

    @SmarterMSP

    20 Feb 2025

    11 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  33. 💡CVE-2025-0108 PAN-OS: Authentication Bypass in the Management Web Interface https://t.co/y8sztVUhTo

    @DarkWebInformer

    20 Feb 2025

    2892 Impressions

    8 Retweets

    31 Likes

    13 Bookmarks

    0 Replies

    0 Quotes

  34. Palo Alto Networks warns that a file read vulnerability (CVE-2025-0111) is now being chained in attacks with two other flaws (CVE-2025-0108 with CVE-2024-9474) to breach PAN-OS firewalls in active attacks. https://t.co/kBTdJnAFpQ

    @blackwired32799

    20 Feb 2025

    25 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  35. 🚨 A Critical Vulnerability Exists in Palo Alto Networks PAN-OS Software (CVE-2025-0108). Please see the @ncsc_gov_ie advisory for more details: https://t.co/1mcsnZELR0

    @ncsc_gov_ie

    20 Feb 2025

    235 Impressions

    0 Retweets

    2 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  36. 🚨🚨CVE-2025-0111: PAN-OS: Authenticated File Read Vulnerability in the Management Web Interface ⚠️Hackers are chaining it with CVE-2025-0108 & CVE-2024-9474 to breach firewalls! ZoomEye Dork👉app="Palo Alto Networks PAN-OS Firewall" 3.7k+ results are found on ZoomEye. SHODA

    @zoomeye_team

    20 Feb 2025

    389 Impressions

    0 Retweets

    2 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  37. 🚨🚨CVE-2025-0111: PAN-OS: Authenticated File Read Vulnerability in the Management Web Interface ⚠️Hackers are chaining it with CVE-2025-0108 & CVE-2024-9474 to breach firewalls! ZoomEye Dork👉app="Palo Alto Networks PAN-OS Firewall" 3.7k+ results are found on ZoomEye. Zoom

    @zoomeye_team

    20 Feb 2025

    24 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  38. Have you updated your PAN-OS firewall? A file read vulnerability (CVE-2025-0111) is being exploited in combination with two other vulnerabilities (CVE-2025-0108 and CVE-2024-9474) to gain root privileges on an unpatched PAN-OS firewall. https://t.co/6FBudk6COp

    @WRANCORP

    20 Feb 2025

    113 Impressions

    0 Retweets

    4 Likes

    0 Bookmarks

    0 Replies

    1 Quote

  39. Palo Alto Networks warns that a file read vulnerability (CVE-2025-0111) is now being chained in attacks with two other flaws (CVE-2025-0108 with CVE-2024-9474) to breach PAN-OS firewalls in active attacks. https://t.co/I1DIMQtMwb #rhymtech #thinkcyberthinkrhym #rhymcyberupdates

    @Rhym_Tech

    20 Feb 2025

    5 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  40. Palo Alto Networks warns that a new exploit chain is actively being used against unpatched PAN-OS firewalls. Attackers are chaining CVE-2025-0108, CVE-2024-9474, and CVE-2025-0111 to gain root access and steal sensitive data. Despite patches being available https://t.co/SUfubA5Ye

    @cyberbulletins

    20 Feb 2025

    57 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  41. Palo Alto Networks warns of another firewall vulnerability under attack by hackers. The company updated its advisory on Tuesday to warn that the vulnerability tracked as CVE-2025-0108 is under active attack. https://t.co/SuQ8EAz6Pm https://t.co/C7eKWVl095

    @riskigy

    20 Feb 2025

    32 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  42. Palo Alto Networks warns that hackers are actively exploiting a critical authentication bypass flaw (CVE-2025-0108) in PAN-OS firewalls, chaining it with two ot… #CyberSecurity ⁦@PaloAltoNtwks⁩ https://t.co/G9ajglJ2E7

    @1Ivango1

    20 Feb 2025

    28 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  43. 🚨 High Security Vulnerability 🆔 CVE-2025-0108 💣 CVSS Score: 8.8 📅 Published Date: 25/02/12 ⚠️ Details: An authentication bypass in the Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to bypass the… htt

    @DarkWebInformer

    19 Feb 2025

    2687 Impressions

    2 Retweets

    19 Likes

    2 Bookmarks

    0 Replies

    0 Quotes

  44. 🚨 **New PAN-OS Vulnerability Alert!** 🚨 CVE-2025-0108 is an **authentication bypass flaw** putting **Palo Alto firewalls** at risk! Hackers are **actively exploiting** it—don't wait to secure your system. Learn how to **patch & protect** now: 🔗 https://t.co/pw8lAKGKxO h

    @Yobitech_Cyber

    19 Feb 2025

    33 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  45. 🚨 Critical vulnerability (CVE-2025-0108) in Palo Alto Networks' PAN-OS allows attackers to bypass authentication. Affected versions should be patched immediately as exploitation attempts increase globally. 🌍 #PaloAlto #CISA #USA https://t.co/lwBSn8TcOK

    @4matic247

    19 Feb 2025

    3 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  46. Concerned about Palo Alto Zero Day CVE-2025-0108? See how you can easily address and mitigate using the security features of Forward Enterprise, the award-winning network digital twin platform. Stay safe! #networksecurity #cybersecurity #CVE2025_0108 https://t.co/oyZUjjc5JA

    @FwdNetworks

    19 Feb 2025

    14 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    4 Replies

    0 Quotes

  47. CISA has added two significant vulnerabilities affecting Palo Alto Networks PAN-OS and SonicWall SonicOS SSLVPN to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild. 🔴 CVE-2025-0108 (CVSS: 7.8): This is an authentication… http

    @cytexsmb

    19 Feb 2025

    236 Impressions

    1 Retweet

    1 Like

    0 Bookmarks

    3 Replies

    1 Quote

  48. Palo Alto Networks alerts of active exploits in PAN-OS firewalls affecting unpatched devices. CVE-2025-0111, CVE-2025-0108, and CVE-2024-9474 pose risks to sensitive data. #CISA #PaloAlto #USA link: https://t.co/BWFJjXMbtR https://t.co/fngIbmgBM5

    @TweetThreatNews

    19 Feb 2025

    108 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    5 Replies

    0 Quotes

  49. 🚨 Critical vulnerability (CVE-2025-0108) in Palo Alto Networks' PAN-OS allows attackers to bypass authentication. Affected versions should be patched immediately as exploitation attempts increase globally. 🌍 #PaloAlto #CISA #USA link: https://t.co/yBhfs9XY8G https://t.co/cN0jv

    @TweetThreatNews

    19 Feb 2025

    85 Impressions

    1 Retweet

    0 Likes

    0 Bookmarks

    4 Replies

    0 Quotes

  50. Palo Alto Networks has reported active exploitation of vulnerabilities in its PAN-OS software, specifically CVE-2024-9474 (6.9-rated) and CVE-2025-0108 (8.8-rated), which, when chained with CVE-2025-0111 (7. https://t.co/8s67C36hqT

    @securityRSS

    19 Feb 2025

    55 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

Configurations