CVSSv4: 8.8 |
CVSSv3: NA |
CVSSv2: NA |
VMScore: 980 |
EPSS: 0.93453 |
KEV: Exploitation Reported
Published: 12/02/2025 Updated: 12/02/2025
Vulnerability Summary
Authentication Bypass in Palo Alto Networks PAN-OS Management Web Interface
An authentication bypass vulnerability exists in Palo Alto Networks PAN-OS software that allows an unauthenticated attacker with network access to the management web interface to bypass normal authentication requirements. By invoking specific PHP scripts, an attacker can potentially compromise the integrity and confidentiality of the PAN-OS system, though remote code execution is not possible. Palo Alto Networks recommends reducing risk by restricting management web interface access to trusted internal IP addresses according to their deployment best practices. This vulnerability specifically impacts PAN-OS software and does not affect Cloud NGFW or Prisma Access.
Solution
Version Minor VersionSuggested Solution PAN-OS 10.1 10.1.0 through 10.1.14 Upgrade to 10.1.14-h9 or later PAN-OS 10.2 10.2.0 through 10.2.13 Upgrade to 10.2.13-h3 or later PAN-OS 11.0 (EoL) Upgrade to a supported fixed versionPAN-OS 11.1 11.1.0 through 11.1.6 Upgrade to 11.1.6-h1 or later PAN-OS 11.2 11.2.0 through 11.2.4 Upgrade to 11.2.4-h4 or laterNote: PAN-OS 11.0 reached end of life (EoL) on November 17, 2024. No additional fixes are planned for this release.
This tool tests whether a target PAN-OS device is vulnerable to the CVE-2025-0108 authentication bypass vulnerability It sends a crafted HTTP request to the target and analyzes the response to determine if the device is exploitable
Usage
single ip
python auth_bypass_cve_2025_0108py -u target-urlcom
Multiple ip
python auth_byp
This repository contains a Proof of Concept (PoC) for the **CVE-2025-0108** vulnerability, which is an **authentication bypass** issue in Palo Alto Networks' PAN-OS software. The scripts provided here test for the vulnerability by sending a crafted HTTP request to the target systems.
CVE-2025-0108 Detection Template 🔍
Nuclei template for Palo Alto PAN-OS Authentication Bypass (CVE-2025-0108)
📜 Overview
A detection template for an authentication bypass vulnerability in Palo Alto PAN-OS management interface that allows unauthorized access via crafted path traversal requests
CVSS 40: 88 (Base) / 78 (Threat)
Severity: High 🔥
Exploitation Status: No
IOC LIST
This repository publishes dynamic IOC (Indicators of Compromise) lists containing malicious IP addresses for use in firewalls to automatically detect and block IPs associated with malicious activities and vulnerabilities
Repository Function
Collection and Updates: Gather and maintain up-to-date lists of malicious IP addresses
Security Integration: Provide dynamic li
CISA flags Craft CMS code injection flaw as exploited in attacks By Bill Toulas February 21, 2025 10:57 AM 0 The U.S. Cybersecurity & Infrastructure Security Agency (CISA) warns that a Craft CMS remote code execution flaw is being exploited in attacks. The flaw is tracked as CVE-2025-23209 and is a high severity (CVSS v3 score: 8.0) code injection (RCE) vulnerability impacting Craft CMS versions 4 and 5. Craft CMS is a content management system (CMS) used for building websites and cust...
Palo Alto Networks tags new firewall bug as exploited in attacks By Bill Toulas February 19, 2025 10:38 AM 0 Palo Alto Networks warns that a file read vulnerability (CVE-2025-0111) is now being chained in attacks with two other flaws (CVE-2025-0108 with CVE-2024-9474) to breach PAN-OS firewalls in active attacks. The vendor first disclosed the authentication bypass vulnerability tracked as CVE-2025-0108 on February 12, 2025, releasing patches to fix the vulnerability. That same day, Assetnote re...
Hackers exploit authentication bypass in Palo Alto Networks PAN-OS By Bill Toulas February 14, 2025 04:20 PM 0 Hackers are launching attacks against Palo Alto Networks PAN-OS firewalls by exploiting a recently fixed vulnerability (CVE-2025-0108) that allows bypassing authentication. The security issue received a high-severity score and impacts the PAN-OS management web interface and allows an unauthenticated attacker on the network to bypass authentication and invoke certain PHP script...
Topics Security Off-Prem On-Prem Software Offbeat Special Features Vendor Voice Vendor Voice Resources If you want to avoid urgent patches, stop exposing management consoles to the public internet
A flaw patched last week by Palo Alto Networks is now under active attack and, when chained with two older vulnerabilities, allows attackers to gain root access to affected systems. This story starts with CVE-2024-9474, a 6.9-rated privilege escalation vulnerability in Palo Alto Networks PAN-OS software that allowed an OS administrator with access to the management web interface to perform actions on the firewall with root privileges. The company patched it in November 2024. Dark web intelligenc...