9.1

CVE-2025-0108

Warning
Media report
Exploit

An authentication bypass in the Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to bypass the authentication otherwise required by the PAN-OS management web interface and invoke certain PHP scripts. While invoking these PHP scripts does not enable remote code execution, it can negatively impact integrity and confidentiality of PAN-OS.

You can greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended  best practices deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 .

This issue does not affect Cloud NGFW or Prisma Access software.

Data is provided by the National Vulnerability Database (NVD)
PaloaltonetworksPan-os Version >= 10.1.0 < 10.1.14
PaloaltonetworksPan-os Version >= 10.2.0 < 10.2.7
PaloaltonetworksPan-os Version >= 11.1.0 < 11.1.2
PaloaltonetworksPan-os Version >= 11.2.0 < 11.2.4
PaloaltonetworksPan-os Version10.1.14 Update-
PaloaltonetworksPan-os Version10.1.14 Updateh1
PaloaltonetworksPan-os Version10.1.14 Updateh2
PaloaltonetworksPan-os Version10.1.14 Updateh3
PaloaltonetworksPan-os Version10.1.14 Updateh4
PaloaltonetworksPan-os Version10.1.14 Updateh5
PaloaltonetworksPan-os Version10.1.14 Updateh6
PaloaltonetworksPan-os Version10.1.14 Updateh7
PaloaltonetworksPan-os Version10.1.14 Updateh8
PaloaltonetworksPan-os Version10.2.7 Update-
PaloaltonetworksPan-os Version10.2.7 Updateh1
PaloaltonetworksPan-os Version10.2.7 Updateh10
PaloaltonetworksPan-os Version10.2.7 Updateh11
PaloaltonetworksPan-os Version10.2.7 Updateh12
PaloaltonetworksPan-os Version10.2.7 Updateh13
PaloaltonetworksPan-os Version10.2.7 Updateh14
PaloaltonetworksPan-os Version10.2.7 Updateh15
PaloaltonetworksPan-os Version10.2.7 Updateh16
PaloaltonetworksPan-os Version10.2.7 Updateh17
PaloaltonetworksPan-os Version10.2.7 Updateh18
PaloaltonetworksPan-os Version10.2.7 Updateh19
PaloaltonetworksPan-os Version10.2.7 Updateh2
PaloaltonetworksPan-os Version10.2.7 Updateh20
PaloaltonetworksPan-os Version10.2.7 Updateh21
PaloaltonetworksPan-os Version10.2.7 Updateh22
PaloaltonetworksPan-os Version10.2.7 Updateh23
PaloaltonetworksPan-os Version10.2.7 Updateh3
PaloaltonetworksPan-os Version10.2.7 Updateh4
PaloaltonetworksPan-os Version10.2.7 Updateh5
PaloaltonetworksPan-os Version10.2.7 Updateh6
PaloaltonetworksPan-os Version10.2.7 Updateh7
PaloaltonetworksPan-os Version10.2.7 Updateh8
PaloaltonetworksPan-os Version10.2.7 Updateh9
PaloaltonetworksPan-os Version10.2.8 Update-
PaloaltonetworksPan-os Version10.2.8 Updateh1
PaloaltonetworksPan-os Version10.2.8 Updateh10
PaloaltonetworksPan-os Version10.2.8 Updateh11
PaloaltonetworksPan-os Version10.2.8 Updateh12
PaloaltonetworksPan-os Version10.2.8 Updateh13
PaloaltonetworksPan-os Version10.2.8 Updateh14
PaloaltonetworksPan-os Version10.2.8 Updateh15
PaloaltonetworksPan-os Version10.2.8 Updateh16
PaloaltonetworksPan-os Version10.2.8 Updateh17
PaloaltonetworksPan-os Version10.2.8 Updateh18
PaloaltonetworksPan-os Version10.2.8 Updateh19
PaloaltonetworksPan-os Version10.2.8 Updateh2
PaloaltonetworksPan-os Version10.2.8 Updateh20
PaloaltonetworksPan-os Version10.2.8 Updateh3
PaloaltonetworksPan-os Version10.2.8 Updateh4
PaloaltonetworksPan-os Version10.2.8 Updateh5
PaloaltonetworksPan-os Version10.2.8 Updateh6
PaloaltonetworksPan-os Version10.2.8 Updateh7
PaloaltonetworksPan-os Version10.2.8 Updateh8
PaloaltonetworksPan-os Version10.2.8 Updateh9
PaloaltonetworksPan-os Version10.2.9 Update-
PaloaltonetworksPan-os Version10.2.9 Updateh1
PaloaltonetworksPan-os Version10.2.9 Updateh11
PaloaltonetworksPan-os Version10.2.9 Updateh12
PaloaltonetworksPan-os Version10.2.9 Updateh13
PaloaltonetworksPan-os Version10.2.9 Updateh14
PaloaltonetworksPan-os Version10.2.9 Updateh15
PaloaltonetworksPan-os Version10.2.9 Updateh16
PaloaltonetworksPan-os Version10.2.9 Updateh17
PaloaltonetworksPan-os Version10.2.9 Updateh18
PaloaltonetworksPan-os Version10.2.9 Updateh19
PaloaltonetworksPan-os Version10.2.9 Updateh2
PaloaltonetworksPan-os Version10.2.9 Updateh20
PaloaltonetworksPan-os Version10.2.9 Updateh3
PaloaltonetworksPan-os Version10.2.9 Updateh4
PaloaltonetworksPan-os Version10.2.9 Updateh5
PaloaltonetworksPan-os Version10.2.9 Updateh6
PaloaltonetworksPan-os Version10.2.9 Updateh7
PaloaltonetworksPan-os Version10.2.9 Updateh8
PaloaltonetworksPan-os Version10.2.9 Updateh9
PaloaltonetworksPan-os Version10.2.10 Update-
PaloaltonetworksPan-os Version10.2.10 Updateh1
PaloaltonetworksPan-os Version10.2.10 Updateh10
PaloaltonetworksPan-os Version10.2.10 Updateh11
PaloaltonetworksPan-os Version10.2.10 Updateh12
PaloaltonetworksPan-os Version10.2.10 Updateh13
PaloaltonetworksPan-os Version10.2.10 Updateh2
PaloaltonetworksPan-os Version10.2.10 Updateh3
PaloaltonetworksPan-os Version10.2.10 Updateh4
PaloaltonetworksPan-os Version10.2.10 Updateh5
PaloaltonetworksPan-os Version10.2.10 Updateh6
PaloaltonetworksPan-os Version10.2.10 Updateh7
PaloaltonetworksPan-os Version10.2.10 Updateh8
PaloaltonetworksPan-os Version10.2.10 Updateh9
PaloaltonetworksPan-os Version10.2.11 Update-
PaloaltonetworksPan-os Version10.2.11 Updateh1
PaloaltonetworksPan-os Version10.2.11 Updateh10
PaloaltonetworksPan-os Version10.2.11 Updateh11
PaloaltonetworksPan-os Version10.2.11 Updateh2
PaloaltonetworksPan-os Version10.2.11 Updateh3
PaloaltonetworksPan-os Version10.2.11 Updateh4
PaloaltonetworksPan-os Version10.2.11 Updateh5
PaloaltonetworksPan-os Version10.2.11 Updateh6
PaloaltonetworksPan-os Version10.2.11 Updateh7
PaloaltonetworksPan-os Version10.2.11 Updateh8
PaloaltonetworksPan-os Version10.2.11 Updateh9
PaloaltonetworksPan-os Version10.2.12 Update-
PaloaltonetworksPan-os Version10.2.12 Updateh1
PaloaltonetworksPan-os Version10.2.12 Updateh2
PaloaltonetworksPan-os Version10.2.12 Updateh3
PaloaltonetworksPan-os Version10.2.12 Updateh4
PaloaltonetworksPan-os Version10.2.12 Updateh5
PaloaltonetworksPan-os Version10.2.13 Update-
PaloaltonetworksPan-os Version10.2.13 Updateh1
PaloaltonetworksPan-os Version10.2.13 Updateh2
PaloaltonetworksPan-os Version11.1.2 Update-
PaloaltonetworksPan-os Version11.1.2 Updateh1
PaloaltonetworksPan-os Version11.1.2 Updateh10
PaloaltonetworksPan-os Version11.1.2 Updateh11
PaloaltonetworksPan-os Version11.1.2 Updateh12
PaloaltonetworksPan-os Version11.1.2 Updateh13
PaloaltonetworksPan-os Version11.1.2 Updateh14
PaloaltonetworksPan-os Version11.1.2 Updateh15
PaloaltonetworksPan-os Version11.1.2 Updateh16
PaloaltonetworksPan-os Version11.1.2 Updateh17
PaloaltonetworksPan-os Version11.1.2 Updateh2
PaloaltonetworksPan-os Version11.1.2 Updateh3
PaloaltonetworksPan-os Version11.1.2 Updateh4
PaloaltonetworksPan-os Version11.1.2 Updateh5
PaloaltonetworksPan-os Version11.1.2 Updateh6
PaloaltonetworksPan-os Version11.1.2 Updateh7
PaloaltonetworksPan-os Version11.1.2 Updateh8
PaloaltonetworksPan-os Version11.1.2 Updateh9
PaloaltonetworksPan-os Version11.1.3
PaloaltonetworksPan-os Version11.1.4 Update-
PaloaltonetworksPan-os Version11.1.4 Updateh1
PaloaltonetworksPan-os Version11.1.4 Updateh10
PaloaltonetworksPan-os Version11.1.4 Updateh11
PaloaltonetworksPan-os Version11.1.4 Updateh12
PaloaltonetworksPan-os Version11.1.4 Updateh2
PaloaltonetworksPan-os Version11.1.4 Updateh3
PaloaltonetworksPan-os Version11.1.4 Updateh4
PaloaltonetworksPan-os Version11.1.4 Updateh5
PaloaltonetworksPan-os Version11.1.4 Updateh6
PaloaltonetworksPan-os Version11.1.4 Updateh7
PaloaltonetworksPan-os Version11.1.4 Updateh8
PaloaltonetworksPan-os Version11.1.4 Updateh9
PaloaltonetworksPan-os Version11.1.5
PaloaltonetworksPan-os Version11.1.6 Update-
PaloaltonetworksPan-os Version11.2.4 Update-
PaloaltonetworksPan-os Version11.2.4 Updateh1
PaloaltonetworksPan-os Version11.2.4 Updateh2
PaloaltonetworksPan-os Version11.2.4 Updateh3

18.02.2025: CISA Known Exploited Vulnerabilities (KEV) Catalog

Palo Alto Networks PAN-OS Authentication Bypass Vulnerability

Vulnerability

Palo Alto Networks PAN-OS contains an authentication bypass vulnerability in its management web interface. This vulnerability allows an unauthenticated attacker with network access to the management web interface to bypass the authentication normally required and invoke certain PHP scripts.

Description

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Required actions
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 94.01% 0.999
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 9.1 3.9 5.2
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
psirt@paloaltonetworks.com 8.8 0 0
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:U/V:C/RE:M/U:Red
CWE-306 Missing Authentication for Critical Function

The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.