NA
CVSSv3

CVE-2025-0130

CVSSv4: 8.2 | CVSSv3: NA | CVSSv2: NA | VMScore: 920 | EPSS: 0.00069 | KEV: Not Included
Published: 14/05/2025 Updated: 16/05/2025

Vulnerability Summary

Unauthenticated Packet Flood Vulnerability in Palo Alto Networks PAN-OS Web Proxy

A missing exception check in Palo Alto Networks PAN-OS® software with the web proxy feature enabled allows an unauthenticated malicious user to send a burst of maliciously crafted packets that causes the firewall to become unresponsive and eventually reboot. Repeated successful attempts to trigger this condition will cause the firewall to enter maintenance mode. This issue does not affect Cloud NGFW or Prisma Access.

Solution

Version
Minor Version
Suggested Solution
PAN-OS 11.2
11.2.0 through 11.2.4Upgrade to 11.2.5 or later.
PAN-OS 11.111.1.0 through 11.1.7
Upgrade to 11.1.7-h2 or 11.1.8 or later. 11.1.0 through 11.1.6Upgrade to 11.1.6-h1 or 11.1.8 or later.PAN-OS 11.0 (EoL)

Upgrade to a supported fixed version.
PAN-OS 10.2
No action needed.PAN-OS 10.1
No action needed.All other
unsupported
PAN-OS versions Upgrade to a supported fixed version.
Vulnerable Product Search on Vulmon Subscribe to Product

paloaltonetworks pan-os 11.2.4

paloaltonetworks pan-os 11.2.3

paloaltonetworks pan-os 11.2.2

paloaltonetworks pan-os 11.2.1

paloaltonetworks pan-os 11.2.0

paloaltonetworks pan-os 11.1.6

paloaltonetworks pan-os 11.1.5

paloaltonetworks pan-os 11.1.4

paloaltonetworks pan-os 11.1.3

paloaltonetworks pan-os 11.1.2

paloaltonetworks pan-os 11.1.1

paloaltonetworks pan-os 11.1.0

palo alto networks cloud ngfw

palo alto networks pan-os

palo alto networks prisma access