CVE-2025-0136
- EPSS 0.09%
- Veröffentlicht 14.05.2025 18:12:14
- Zuletzt bearbeitet 16.05.2025 14:43:56
Using the AES-128-CCM algorithm for IPSec on certain Palo Alto Networks PAN-OS® firewalls (PA-7500, PA-5400, PA-5400f, PA-3400, PA-1600, PA-1400, and PA-400 Series) leads to unencrypted data transfer to devices that are connected to the PAN-OS firewa...
CVE-2025-0137
- EPSS 0.37%
- Veröffentlicht 14.05.2025 18:09:32
- Zuletzt bearbeitet 16.05.2025 14:43:56
An improper input neutralization vulnerability in the management web interface of the Palo Alto Networks PAN-OS® software enables a malicious authenticated read-write administrator to impersonate another legitimate authenticated PAN-OS administrator....
CVE-2025-0133
- EPSS 3.51%
- Veröffentlicht 14.05.2025 18:07:36
- Zuletzt bearbeitet 16.05.2025 14:43:56
A reflected cross-site scripting (XSS) vulnerability in the GlobalProtect™ gateway and portal features of Palo Alto Networks PAN-OS® software enables execution of malicious JavaScript in the context of an authenticated Captive Portal user's browser w...
CVE-2025-0130
- EPSS 0.3%
- Veröffentlicht 14.05.2025 17:37:40
- Zuletzt bearbeitet 06.10.2025 16:18:22
A missing exception check in Palo Alto Networks PAN-OS® software with the web proxy feature enabled allows an unauthenticated attacker to send a burst of maliciously crafted packets that causes the firewall to become unresponsive and eventually reboo...
CVE-2025-0123
- EPSS 0.16%
- Veröffentlicht 11.04.2025 17:43:05
- Zuletzt bearbeitet 15.04.2025 18:39:43
A vulnerability in the Palo Alto Networks PAN-OS® software enables unlicensed administrators to view clear-text data captured using the packet capture feature https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-admin/monitoring/take-packet-captures...
CVE-2025-0127
- EPSS 0.14%
- Veröffentlicht 11.04.2025 02:15:19
- Zuletzt bearbeitet 11.04.2025 15:39:52
A command injection vulnerability in Palo Alto Networks PAN-OS® software enables an authenticated administrator to bypass system restrictions and run arbitrary commands as a root user. This issue is only applicable to PAN-OS VM-Series. This issue doe...
CVE-2025-0128
- EPSS 0.11%
- Veröffentlicht 11.04.2025 02:15:19
- Zuletzt bearbeitet 11.04.2025 15:39:52
A denial-of-service (DoS) vulnerability in the Simple Certificate Enrollment Protocol (SCEP) authentication feature of Palo Alto Networks PAN-OS® software enables an unauthenticated attacker to initiate system reboots using a maliciously crafted pack...
CVE-2025-0124
- EPSS 0.7%
- Veröffentlicht 11.04.2025 02:15:18
- Zuletzt bearbeitet 02.10.2025 15:16:35
An authenticated file deletion vulnerability in the Palo Alto Networks PAN-OS® software enables an authenticated attacker with network access to the management web interface to delete certain files as the “nobody” user; this includes limited logs and...
CVE-2025-0125
- EPSS 0.54%
- Veröffentlicht 11.04.2025 02:15:18
- Zuletzt bearbeitet 11.04.2025 15:39:52
An improper input neutralization vulnerability in the management web interface of the Palo Alto Networks PAN-OS® software enables a malicious authenticated read-write administrator to impersonate another legitimate authenticated PAN-OS administrator....
CVE-2025-0126
- EPSS 0.36%
- Veröffentlicht 11.04.2025 02:15:18
- Zuletzt bearbeitet 11.04.2025 15:39:52
When configured using SAML, a session fixation vulnerability in the GlobalProtect™ login enables an attacker to impersonate a legitimate authorized user and perform actions as that GlobalProtect user. This requires the legitimate user to first click ...