CVE-2025-0108

Published Feb 12, 2025

Last updated a month ago

Overview

AI description

Generated using AI and has not been reviewed by Intruder. May contain errors.

CVE-2025-0108 is an authentication bypass vulnerability found in the web management interface of Palo Alto Networks' PAN-OS firewall software. This vulnerability allows unauthenticated network access to bypass authentication and execute certain PHP scripts on affected devices. While this flaw doesn't directly permit remote code execution, it can compromise the integrity and confidentiality of the PAN-OS system. This vulnerability has been actively exploited in the wild.

Description
An authentication bypass in the Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to bypass the authentication otherwise required by the PAN-OS management web interface and invoke certain PHP scripts. While invoking these PHP scripts does not enable remote code execution, it can negatively impact integrity and confidentiality of PAN-OS. You can greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended best practices deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 . This issue does not affect Cloud NGFW or Prisma Access software.
Source
psirt@paloaltonetworks.com
NVD status
Modified

Insights

Analysis from the Intruder Security Team
Published Feb 13, 2025 Updated Feb 13, 2025

The mitigations that were put in place following the previous authentication bypass (CVE-2024-0012) were incomplete. The authentication step for the management panel can be abused to change the order of processing requests between various underlying technologies (apache, nginx, PHP), resulting in an auth bypass. AssetNote released a technical breakdown of this vulnerability.

Palo Alto have released patches for the vulnerability, details are available here

Risk scores

CVSS 4.0

Type
Secondary
Base score
8.8
Impact score
-
Exploitability score
-
Vector string
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:U/V:C/RE:M/U:Red
Severity
HIGH

CVSS 3.1

Type
Primary
Base score
9.1
Impact score
5.2
Exploitability score
3.9
Vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Severity
CRITICAL

Known exploits

Data from CISA

Vulnerability name
Palo Alto Networks PAN-OS Authentication Bypass Vulnerability
Exploit added on
Feb 18, 2025
Exploit action due
Mar 11, 2025
Required action
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Weaknesses

psirt@paloaltonetworks.com
CWE-306
nvd@nist.gov
CWE-306

Social media

Hype score
Not currently trending
  1. Listen to "CVE-2025-0108 Root Cause Analysis: PAN-OS Authentication Bypass" by Tech Unplugged. https://t.co/LCvuI8rTHU

    @SublimeTechie

    12 Mar 2025

    2 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  2. Actively exploited CVE : CVE-2025-0108

    @transilienceai

    8 Mar 2025

    12 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  3. Actively exploited CVE : CVE-2025-0108

    @transilienceai

    5 Mar 2025

    25 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  4. Actively exploited CVE : CVE-2025-0108

    @transilienceai

    4 Mar 2025

    20 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  5. 🚨 ¡ALERTA DE SEGURIDAD! 🚨 Palo Alto Networks advierte sobre una vulnerabilidad crítica (CVE-2025-0108) que está siendo explotada activamente. 🔥 Si usas firewalls PAN-OS, ¡es urgente que leas esto! ⬇️ #CyberSecurity #Infosec https://t.co/ZaoAt5UAPd

    @C1B3R53CUR1TY

    3 Mar 2025

    47 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  6. Actively exploited CVE : CVE-2025-0108

    @transilienceai

    2 Mar 2025

    41 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  7. Actively exploited CVE : CVE-2025-0108

    @transilienceai

    1 Mar 2025

    28 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  8. Actively exploited CVE : CVE-2025-0108

    @transilienceai

    28 Feb 2025

    20 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  9. Actively exploited CVE : CVE-2025-0108

    @transilienceai

    28 Feb 2025

    16 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  10. Actively exploited CVE : CVE-2025-0108

    @transilienceai

    27 Feb 2025

    17 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  11. A recent advisory has revealed that the severity of the Palo Alto PAN-OS bug CVE-2025-0108 has been upgraded, as it allows unauthenticated attackers to exploit the web management interface in the wild. #CyberSecurity #Vulnerability https://t.co/CHp1Y7slnd

    @Cyber_O51NT

    27 Feb 2025

    93 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  12. There have been reports of active exploitation of a critical authentication bypass vulnerability (CVE-2025-0108) in Palo Alto Networks PAN-OS. Administrators of affected systems are strongly advised to update to the latest version immediately. https://t.co/ZlDL4IZeT3

    @CSAsingapore

    27 Feb 2025

    127 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  13. Actively exploited CVE : CVE-2025-0108

    @transilienceai

    26 Feb 2025

    25 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  14. Actively exploited CVE : CVE-2025-0108

    @transilienceai

    26 Feb 2025

    21 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  15. Actively exploited CVE : CVE-2025-0108

    @transilienceai

    25 Feb 2025

    21 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  16. Palo Alto Networks hat einen Sicherheitshinweis zu CVE-2025-0108 veröffentlicht, einer Authentifizierungsumgehungsschwachstelle in der Verwaltungsweboberfläche von PAN-OS. Hier finden Sie die Empfehlungen von Arctic Wolf. #EndCyberRisk https://t.co/oo4TnUoBQb

    @rfrumm

    25 Feb 2025

    6 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  17. Actively exploited CVE : CVE-2025-0108

    @transilienceai

    24 Feb 2025

    21 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  18. 🚨 🚨 WARNING: #CVE-2025-0108 Under Active Exploitation https://t.co/GU3xxl4Hua

    @UndercodeUpdate

    24 Feb 2025

    49 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  19. 🚨 High Security Vulnerability in Palo Alto Networks PAN-#OS (#CVE-2025-0108) https://t.co/a8EvAw276W

    @UndercodeUpdate

    24 Feb 2025

    38 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  20. https://t.co/Nqm37davkp #PaloAlto Networks warns that a file read #vulnerability (CVE-2025-0111) is now being chained in attacks with two other flaws (CVE-2025-0108 with CVE-2024-9474) to breach PAN-OS #firewalls in active attacks.

    @NSIguy

    23 Feb 2025

    4 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  21. Actively exploited CVE : CVE-2025-0108

    @transilienceai

    23 Feb 2025

    13 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  22. Actively exploited CVE : CVE-2025-0108

    @transilienceai

    22 Feb 2025

    23 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  23. 🚨 Palo Alto firewalls are under attack—again. Hackers are chaining three vulnerabilities (CVE-2025-0108, CVE-2024-9474, CVE-2025-0111) to gain root access. The attack is low complexity & actively exploited. Patch now! More details 👉 https://t.co/54s5KO5vRk #Cybersecurity

    @securityblvd

    22 Feb 2025

    130 Impressions

    1 Retweet

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  24. Threat Alert: Google Releases PoC for CVE-2025-0110 Command Injection in PAN-OS Firewalls CVE-2025-0110 CVE-2025-0109 CVE-2025-0108 Severity: ⚠️ Critical Maturity: 💥 Mainstream Learn more: https://t.co/23GBXF5IbZ #CyberSecurity #ThreatIntel #InfoSec (1/3)

    @fletch_ai

    22 Feb 2025

    49 Impressions

    0 Retweets

    0 Likes

    1 Bookmark

    1 Reply

    0 Quotes

  25. Actively exploited CVE : CVE-2025-0108

    @transilienceai

    22 Feb 2025

    13 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  26. Actively exploited CVE : CVE-2025-0108

    @transilienceai

    21 Feb 2025

    9 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  27. Palo Alto Networks warns of active exploitation of critical vulnerabilities CVE-2025-0108 and CVE-2025-0111 in PAN-OS firewalls. Immediate remediation is crucial to prevent remote code execution. 🔒🚨 #PaloAlto #Firewalls #USA link: https://t.co/Vu6LRj7MQ2 https://t.co/ojqlzun2W

    @TweetThreatNews

    21 Feb 2025

    15 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  28. Critical #vulnerability alert: CVE-2025-0108 in PAN-OS enables attackers to bypass authentication and compromise system integrity. Learn how to protect your organization in this #CybersecurityThreatAdvisory: https://t.co/G12na2ZurH

    @SmarterMSP

    20 Feb 2025

    11 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  29. 💡CVE-2025-0108 PAN-OS: Authentication Bypass in the Management Web Interface https://t.co/y8sztVUhTo

    @DarkWebInformer

    20 Feb 2025

    2892 Impressions

    8 Retweets

    31 Likes

    13 Bookmarks

    0 Replies

    0 Quotes

  30. Palo Alto Networks warns that a file read vulnerability (CVE-2025-0111) is now being chained in attacks with two other flaws (CVE-2025-0108 with CVE-2024-9474) to breach PAN-OS firewalls in active attacks. https://t.co/kBTdJnAFpQ

    @blackwired32799

    20 Feb 2025

    25 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  31. 🚨 A Critical Vulnerability Exists in Palo Alto Networks PAN-OS Software (CVE-2025-0108). Please see the @ncsc_gov_ie advisory for more details: https://t.co/1mcsnZELR0

    @ncsc_gov_ie

    20 Feb 2025

    235 Impressions

    0 Retweets

    2 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  32. 🚨🚨CVE-2025-0111: PAN-OS: Authenticated File Read Vulnerability in the Management Web Interface ⚠️Hackers are chaining it with CVE-2025-0108 & CVE-2024-9474 to breach firewalls! ZoomEye Dork👉app="Palo Alto Networks PAN-OS Firewall" 3.7k+ results are found on ZoomEye. SHODA

    @zoomeye_team

    20 Feb 2025

    389 Impressions

    0 Retweets

    2 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  33. 🚨🚨CVE-2025-0111: PAN-OS: Authenticated File Read Vulnerability in the Management Web Interface ⚠️Hackers are chaining it with CVE-2025-0108 & CVE-2024-9474 to breach firewalls! ZoomEye Dork👉app="Palo Alto Networks PAN-OS Firewall" 3.7k+ results are found on ZoomEye. Zoom

    @zoomeye_team

    20 Feb 2025

    24 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  34. Have you updated your PAN-OS firewall? A file read vulnerability (CVE-2025-0111) is being exploited in combination with two other vulnerabilities (CVE-2025-0108 and CVE-2024-9474) to gain root privileges on an unpatched PAN-OS firewall. https://t.co/6FBudk6COp

    @WRANCORP

    20 Feb 2025

    113 Impressions

    0 Retweets

    4 Likes

    0 Bookmarks

    0 Replies

    1 Quote

  35. Palo Alto Networks warns that a file read vulnerability (CVE-2025-0111) is now being chained in attacks with two other flaws (CVE-2025-0108 with CVE-2024-9474) to breach PAN-OS firewalls in active attacks. https://t.co/I1DIMQtMwb #rhymtech #thinkcyberthinkrhym #rhymcyberupdates

    @Rhym_Tech

    20 Feb 2025

    5 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  36. Palo Alto Networks warns that a new exploit chain is actively being used against unpatched PAN-OS firewalls. Attackers are chaining CVE-2025-0108, CVE-2024-9474, and CVE-2025-0111 to gain root access and steal sensitive data. Despite patches being available https://t.co/SUfubA5Ye

    @cyberbulletins

    20 Feb 2025

    57 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  37. Palo Alto Networks warns of another firewall vulnerability under attack by hackers. The company updated its advisory on Tuesday to warn that the vulnerability tracked as CVE-2025-0108 is under active attack. https://t.co/SuQ8EAz6Pm https://t.co/C7eKWVl095

    @riskigy

    20 Feb 2025

    32 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  38. Palo Alto Networks warns that hackers are actively exploiting a critical authentication bypass flaw (CVE-2025-0108) in PAN-OS firewalls, chaining it with two ot… #CyberSecurity ⁦@PaloAltoNtwks⁩ https://t.co/G9ajglJ2E7

    @1Ivango1

    20 Feb 2025

    28 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  39. 🚨 High Security Vulnerability 🆔 CVE-2025-0108 💣 CVSS Score: 8.8 📅 Published Date: 25/02/12 ⚠️ Details: An authentication bypass in the Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to bypass the… htt

    @DarkWebInformer

    19 Feb 2025

    2687 Impressions

    2 Retweets

    19 Likes

    2 Bookmarks

    0 Replies

    0 Quotes

  40. 🚨 **New PAN-OS Vulnerability Alert!** 🚨 CVE-2025-0108 is an **authentication bypass flaw** putting **Palo Alto firewalls** at risk! Hackers are **actively exploiting** it—don't wait to secure your system. Learn how to **patch & protect** now: 🔗 https://t.co/pw8lAKGKxO h

    @Yobitech_Cyber

    19 Feb 2025

    33 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  41. 🚨 Critical vulnerability (CVE-2025-0108) in Palo Alto Networks' PAN-OS allows attackers to bypass authentication. Affected versions should be patched immediately as exploitation attempts increase globally. 🌍 #PaloAlto #CISA #USA https://t.co/lwBSn8TcOK

    @4matic247

    19 Feb 2025

    3 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  42. Concerned about Palo Alto Zero Day CVE-2025-0108? See how you can easily address and mitigate using the security features of Forward Enterprise, the award-winning network digital twin platform. Stay safe! #networksecurity #cybersecurity #CVE2025_0108 https://t.co/oyZUjjc5JA

    @FwdNetworks

    19 Feb 2025

    14 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    4 Replies

    0 Quotes

  43. CISA has added two significant vulnerabilities affecting Palo Alto Networks PAN-OS and SonicWall SonicOS SSLVPN to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild. 🔴 CVE-2025-0108 (CVSS: 7.8): This is an authentication… http

    @cytexsmb

    19 Feb 2025

    236 Impressions

    1 Retweet

    1 Like

    0 Bookmarks

    3 Replies

    1 Quote

  44. Palo Alto Networks alerts of active exploits in PAN-OS firewalls affecting unpatched devices. CVE-2025-0111, CVE-2025-0108, and CVE-2024-9474 pose risks to sensitive data. #CISA #PaloAlto #USA link: https://t.co/BWFJjXMbtR https://t.co/fngIbmgBM5

    @TweetThreatNews

    19 Feb 2025

    108 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    5 Replies

    0 Quotes

  45. 🚨 Critical vulnerability (CVE-2025-0108) in Palo Alto Networks' PAN-OS allows attackers to bypass authentication. Affected versions should be patched immediately as exploitation attempts increase globally. 🌍 #PaloAlto #CISA #USA link: https://t.co/yBhfs9XY8G https://t.co/cN0jv

    @TweetThreatNews

    19 Feb 2025

    85 Impressions

    1 Retweet

    0 Likes

    0 Bookmarks

    4 Replies

    0 Quotes

  46. Palo Alto Networks has reported active exploitation of vulnerabilities in its PAN-OS software, specifically CVE-2024-9474 (6.9-rated) and CVE-2025-0108 (8.8-rated), which, when chained with CVE-2025-0111 (7. https://t.co/8s67C36hqT

    @securityRSS

    19 Feb 2025

    55 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  47. Latest Known Exploited Vulnerabilities (#KEV) : #CVE-2025-0108 Palo Alto Networks #PAN-OS Authentication Bypass Vulnerability https://t.co/1y7fJwOQZI

    @ScyScan

    19 Feb 2025

    13 Impressions

    0 Retweets

    0 Likes

    1 Bookmark

    0 Replies

    0 Quotes

  48. #CISA has added the latest #PaloAlto CVE-2025-0108 to its list of the Known Exploited Vulnerabilities (KEV). We already have a module ready in the OWASP Nettacker project to detect this CVE, will be pushing the next release very soon: https://t.co/AvxiaEazu5

    @securestep9

    19 Feb 2025

    78 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  49. La CISA avertit de plusieurs attaques exploitant une faille critique sur des équipements Palo Alto fonctionnant sous PAN-OS (CVE-2025-0108) https://t.co/sFFVB9NaMz

    @cert_ist

    19 Feb 2025

    14 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  50. پالو آلتو نتورکس از وجود یک آسیب‌پذیری دیگر در دیوار آتش در حال حمله توسط هکرها هشدار می‌دهد 🚨🔒 🚨 هشدار امنیتی 🚨 شرکت Palo Alto Networks هشدار داده است که هکرها از آسیب‌پذیری CVE-2025-0108 در سیستم‌عامل PAN-OS برای نفوذ به شبکه‌ها استفاده می‌ک... https://t.co/cOoqUotCiU

    @Techcrunchfarsi

    19 Feb 2025

    25 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

Configurations