NA
CVSSv3

CVE-2025-0111

CVSSv4: 7.1 | CVSSv3: NA | CVSSv2: NA | VMScore: 810 | EPSS: 0.03848 | KEV: Exploitation Reported
Published: 12/02/2025 Updated: 12/02/2025

Vulnerability Summary

Authenticated File Read Vulnerability in Palo Alto Networks PAN-OS Management Interface

A file read vulnerability exists in Palo Alto Networks PAN-OS software that allows an authenticated attacker with management web interface access to read files on the PAN-OS filesystem that can be accessed by the "nobody" user. Administrators can mitigate this risk by following Palo Alto Networks' recommended best practices, which involve restricting management web interface access to trusted internal IP addresses. The vulnerability specifically does not impact Cloud NGFW or Prisma Access software.

Solution

Version
Minor Version
Suggested Solution
PAN-OS 10.1
10.1.0 through 10.1.14
Upgrade to 10.1.14-h9 or later
PAN-OS 10.2
10.2.0 through 10.2.13
Upgrade to 10.2.13-h3 or later
PAN-OS 11.0 (EoL) Upgrade to a supported fixed versionPAN-OS 11.1
11.1.0 through 11.1.6
Upgrade to 11.1.6-h1 or later
PAN-OS 11.2
11.2.0 through 11.2.4
Upgrade to 11.2.4-h4 or laterNote: PAN-OS 11.0 reached end of life (EoL) on November 17, 2024. No additional fixes are planned for this release.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

paloaltonetworks pan-os 11.2.4

paloaltonetworks pan-os 11.2.3

paloaltonetworks pan-os 11.2.2

paloaltonetworks pan-os 11.2.1

paloaltonetworks pan-os 11.2.0

paloaltonetworks pan-os 11.1.6

paloaltonetworks pan-os 11.1.5

paloaltonetworks pan-os 11.1.4

paloaltonetworks pan-os 11.1.3

paloaltonetworks pan-os 11.1.2

paloaltonetworks pan-os 11.1.1

paloaltonetworks pan-os 11.1.0

paloaltonetworks pan-os 10.2.13

paloaltonetworks pan-os 10.2.12

paloaltonetworks pan-os 10.2.11

paloaltonetworks pan-os 10.2.10

paloaltonetworks pan-os 10.2.9

paloaltonetworks pan-os 10.2.8

paloaltonetworks pan-os 10.2.7

paloaltonetworks pan-os 10.2.6

paloaltonetworks pan-os 10.2.5

paloaltonetworks pan-os 10.2.4

paloaltonetworks pan-os 10.2.3

paloaltonetworks pan-os 10.2.2

paloaltonetworks pan-os 10.2.1

paloaltonetworks pan-os 10.2.0

paloaltonetworks pan-os 10.1.14

paloaltonetworks pan-os 10.1.13

paloaltonetworks pan-os 10.1.12

paloaltonetworks pan-os 10.1.11

paloaltonetworks pan-os 10.1.10

paloaltonetworks pan-os 10.1.9

paloaltonetworks pan-os 10.1.8

paloaltonetworks pan-os 10.1.7

paloaltonetworks pan-os 10.1.6

paloaltonetworks pan-os 10.1.5

paloaltonetworks pan-os 10.1.4

paloaltonetworks pan-os 10.1.3

paloaltonetworks pan-os 10.1.2

paloaltonetworks pan-os 10.1.1

paloaltonetworks pan-os 10.1.0

palo alto networks cloud ngfw

palo alto networks pan-os

palo alto networks prisma access

Recent Articles

CISA flags Craft CMS code injection flaw as exploited in attacks
BleepingComputer • Bill Toulas • 21 Feb 2025

CISA flags Craft CMS code injection flaw as exploited in attacks By Bill Toulas February 21, 2025 10:57 AM 0 The U.S. Cybersecurity & Infrastructure Security Agency (CISA) warns that a Craft CMS remote code execution flaw is being exploited in attacks. The flaw is tracked as CVE-2025-23209 and is a high severity (CVSS v3 score: 8.0)  code injection (RCE) vulnerability impacting Craft CMS versions 4 and 5. Craft CMS is a content management system (CMS) used for building websites and cust...

Palo Alto Networks tags new firewall bug as exploited in attacks
BleepingComputer • Bill Toulas • 19 Feb 2025

Palo Alto Networks tags new firewall bug as exploited in attacks By Bill Toulas February 19, 2025 10:38 AM 0 Palo Alto Networks warns that a file read vulnerability (CVE-2025-0111) is now being chained in attacks with two other flaws (CVE-2025-0108 with CVE-2024-9474) to breach PAN-OS firewalls in active attacks. The vendor first disclosed the authentication bypass vulnerability tracked as CVE-2025-0108 on February 12, 2025, releasing patches to fix the vulnerability. That same day, Assetnote re...

Palo Alto firewalls under attack as miscreants chain flaws for root access
The Register

Topics Security Off-Prem On-Prem Software Offbeat Special Features Vendor Voice Vendor Voice Resources If you want to avoid urgent patches, stop exposing management consoles to the public internet

A flaw patched last week by Palo Alto Networks is now under active attack and, when chained with two older vulnerabilities, allows attackers to gain root access to affected systems. This story starts with CVE-2024-9474, a 6.9-rated privilege escalation vulnerability in Palo Alto Networks PAN-OS software that allowed an OS administrator with access to the management web interface to perform actions on the firewall with root privileges. The company patched it in November 2024. Dark web intelligenc...