PAN-OS authentication bypass vulnerability

Palo Alto PAN-OS Zero-Day Vulnerability Enables Authentication Bypass

Palo Alto Networks has disclosed a zero-day PAN-OS authentication bypass vulnerability, tracked as CVE-2025-010. The flaw allows attackers to access certain PHP scripts on the management web interface without authentication. It has been assigned a CVSS score of 8.8 and affects multiple PAN-OS versions.

Vulnerability Overview

The issue stems from missing authentication controls in the web interface. An attacker with network access to an affected PAN-OS system can exploit this flaw to bypass authentication on the management web interface. While this does not allow remote code execution, it can compromise system integrity and expose sensitive information.

This vulnerability is categorized as:

  • CWE-306: Missing Authentication for Critical Function
  • CAPEC-115: Authentication Bypass

Palo Alto Networks has confirmed that Cloud NGFW and Prisma Access solutions are not impacted.

Impacted PAN-OS Versions

PAN-OS VersionAffected VersionsUnaffected Versions
11.2< 11.2.4-h4>= 11.2.4-h4
11.1< 11.1.6-h1>= 11.1.6-h1
10.2< 10.2.13-h3>= 10.2.13-h3
10.1< 10.1.14-h9>= 10.1.14-h9

PAN-OS 11.0 has reached end-of-life (EOL) as of November 17, 2024, and will not receive security patches.

Risk and Mitigation

The highest risk exists for systems where the management web interface is accessible from untrusted networks or the internet. Palo Alto Networks advises:

  • Update affected systems to the latest fixed versions.
  • Restrict access to the web interface, allowing only trusted internal IPs.
  • Use a jump box as an intermediary for secure management access.
  • Enable Threat IDs 510000 and 510001 (via a Threat Prevention subscription) to detect and block attack attempts.

Current Exploitation Status

While there are no confirmed exploits in the wild, Palo Alto Networks urges immediate action to prevent potential attacks. Security teams can review vulnerable assets in the Customer Support Portal, where affected devices will be labeled PAN-SA-2024-0015.

Leave a Comment

Your email address will not be published. Required fields are marked *