CVE-2025-4619
- EPSS 0.05%
- Veröffentlicht 13.11.2025 20:24:19
- Zuletzt bearbeitet 14.11.2025 16:42:03
A denial-of-service (DoS) vulnerability in Palo Alto Networks PAN-OS software enables an unauthenticated attacker to reboot a firewall by sending a specially crafted packet through the dataplane. Repeated attempts to initiate a reboot causes the fire...
CVE-2025-4615
- EPSS 0.07%
- Veröffentlicht 09.10.2025 18:28:04
- Zuletzt bearbeitet 22.10.2025 17:50:00
An improper input neutralization vulnerability in the management web interface of the Palo Alto Networks PAN-OS® software enables an authenticated administrator to bypass system restrictions and execute arbitrary commands. The security risk posed by...
CVE-2025-4614
- EPSS 0.04%
- Veröffentlicht 09.10.2025 18:13:22
- Zuletzt bearbeitet 22.10.2025 17:52:40
An information disclosure vulnerability in Palo Alto Networks PAN-OS® software enables an authenticated administrator to view session tokens of users authenticated to the firewall web UI. This may allow impersonation of users whose session tokens are...
CVE-2025-2182
- EPSS 0.01%
- Veröffentlicht 13.08.2025 17:03:21
- Zuletzt bearbeitet 13.08.2025 17:33:46
A problem with the implementation of the MACsec protocol in Palo Alto Networks PAN-OS® results in the cleartext exposure of the connectivity association key (CAK). This issue is only applicable to PA-7500 Series devices which are in an NGFW cluster. ...
- EPSS 0.06%
- Veröffentlicht 13.06.2025 05:42:38
- Zuletzt bearbeitet 16.06.2025 12:32:18
An information disclosure vulnerability in the SD-WAN feature of Palo Alto Networks PAN-OS® software enables an unauthorized user to view unencrypted data sent from the firewall through the SD-WAN interface. This requires the user to be able to inter...
CVE-2025-4230
- EPSS 0.06%
- Veröffentlicht 12.06.2025 23:30:15
- Zuletzt bearbeitet 16.06.2025 12:32:18
A command injection vulnerability in Palo Alto Networks PAN-OS® software enables an authenticated administrator to bypass system restrictions and run arbitrary commands as a root user. To be able to exploit this issue, the user must have access to th...
CVE-2025-4231
- EPSS 0.07%
- Veröffentlicht 12.06.2025 23:27:31
- Zuletzt bearbeitet 22.10.2025 12:57:48
A command injection vulnerability in Palo Alto Networks PAN-OS® enables an authenticated administrative user to perform actions as the root user. The attacker must have network access to the management web interface and successfully authenticate to ...
CVE-2025-0136
- EPSS 0.02%
- Veröffentlicht 14.05.2025 18:12:14
- Zuletzt bearbeitet 16.05.2025 14:43:56
Using the AES-128-CCM algorithm for IPSec on certain Palo Alto Networks PAN-OS® firewalls (PA-7500, PA-5400, PA-5400f, PA-3400, PA-1600, PA-1400, and PA-400 Series) leads to unencrypted data transfer to devices that are connected to the PAN-OS firewa...
CVE-2025-0137
- EPSS 0.05%
- Veröffentlicht 14.05.2025 18:09:32
- Zuletzt bearbeitet 16.05.2025 14:43:56
An improper input neutralization vulnerability in the management web interface of the Palo Alto Networks PAN-OS® software enables a malicious authenticated read-write administrator to impersonate another legitimate authenticated PAN-OS administrator....
CVE-2025-0133
- EPSS 5.76%
- Veröffentlicht 14.05.2025 18:07:36
- Zuletzt bearbeitet 16.05.2025 14:43:56
A reflected cross-site scripting (XSS) vulnerability in the GlobalProtect™ gateway and portal features of Palo Alto Networks PAN-OS® software enables execution of malicious JavaScript in the context of an authenticated Captive Portal user's browser w...