CVE-2025-0108

Scores

EPSS

0.941high94.1%
0%20%40%60%80%100%

Percentile: 94.1%

CVSS

8.8high4.0
0246810

CVSS Score: 8.8/10

All CVSS Scores

CVSS 4.0
8.8

Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:U/V:C/RE:M/U:Red

CVSS 3.x
9.1

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Description

An authentication bypass in the Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to bypass the authentication otherwise required by the PAN-OS management web interface and invoke certain PHP scripts. While invoking these PHP scripts does not enable remote code execution, it can negatively impact integrity and confidentiality of PAN-OS.

You can greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended best practices deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 .

This issue does not affect Cloud NGFW or Prisma Access software.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

nvd

CWEs

306CWE-306

Related Vulnerabilities

Exploits

Exploit ID: CVE-2025-0108

Source: github-poc

URL: https://github.com/kso4more/CVE-2025-0108

Vulnerable Software (1)

Type: Configuration

Vendor: *

Product: pan-os

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*",      "versionEndExcluding": "10.1.14",      "versionStartIncluding": "10.1.0",      "vulnerable": tru...

Source: nvd

End of list