4.8

CVE-2025-4614

PAN-OS: Session Token Disclosure Vulnerability

An information disclosure vulnerability in Palo Alto Networks PAN-OS® software enables an authenticated administrator to view session tokens of users authenticated to the firewall web UI. This may allow impersonation of users whose session tokens are leaked.  

The security risk posed by this issue is significantly minimized when CLI access is restricted to a limited group of administrators.

Cloud NGFW and Prisma® Access are not affected by this vulnerability.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
PaloaltonetworksPan-os Version >= 10.2.0 < 10.2.17
PaloaltonetworksPan-os Version >= 11.1.0 < 11.1.6
PaloaltonetworksPan-os Version >= 11.2.0 < 11.2.8
PaloaltonetworksPan-os Version11.1.6 Update-
PaloaltonetworksPan-os Version11.1.6 Updateh1
PaloaltonetworksPan-os Version11.1.6 Updateh10
PaloaltonetworksPan-os Version11.1.6 Updateh14
PaloaltonetworksPan-os Version11.1.6 Updateh17
PaloaltonetworksPan-os Version11.1.6 Updateh19
PaloaltonetworksPan-os Version11.1.6 Updateh20
PaloaltonetworksPan-os Version11.1.6 Updateh3
PaloaltonetworksPan-os Version11.1.6 Updateh4
PaloaltonetworksPan-os Version11.1.6 Updateh5
PaloaltonetworksPan-os Version11.1.6 Updateh6
PaloaltonetworksPan-os Version11.1.6 Updateh7
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.04% 0.11
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 2.7 1.2 1.4
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
psirt@paloaltonetworks.com 4.8 0 0
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:U/V:C/RE:M/U:Amber
CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere

The product does not properly prevent sensitive system-level information from being accessed by unauthorized actors who do not have the same level of access to the underlying system as the product does.