Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-0108: CWE-306 Missing Authentication for Critical Function in Palo Alto Networks Cloud NGFW

0
High
VulnerabilityCVE-2025-0108cvecve-2025-0108cwe-306
Published: Wed Feb 12 2025 (02/12/2025, 20:55:34 UTC)
Source: CVE Database V5
Vendor/Project: Palo Alto Networks
Product: Cloud NGFW

Description

An authentication bypass in the Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to bypass the authentication otherwise required by the PAN-OS management web interface and invoke certain PHP scripts. While invoking these PHP scripts does not enable remote code execution, it can negatively impact integrity and confidentiality of PAN-OS. You can greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended best practices deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 . This issue does not affect Cloud NGFW or Prisma Access software.

AI-Powered Analysis

AILast updated: 10/21/2025, 20:00:16 UTC

Technical Analysis

CVE-2025-0108 is a vulnerability classified under CWE-306 (Missing Authentication for Critical Function) affecting Palo Alto Networks PAN-OS software, specifically the management web interface of Cloud NGFW products. The flaw allows an unauthenticated attacker who has network access to the management interface to bypass the authentication mechanism and invoke certain PHP scripts that are normally protected. While this does not permit remote code execution, it can negatively impact the confidentiality and integrity of the PAN-OS system by exposing sensitive management functions or data. The vulnerability arises because the authentication checks for these critical functions are missing or improperly enforced, allowing unauthorized invocation. The vulnerability has a CVSS v4.0 score of 8.8, indicating high severity, with network attack vector, no required privileges or user interaction, and a high impact on confidentiality. The vulnerability does not affect the Cloud NGFW or Prisma Access software variants, limiting the scope to specific PAN-OS deployments. Palo Alto Networks recommends mitigating this risk by restricting access to the management web interface to trusted internal IP addresses, following their deployment best practices. No patches or exploits are currently reported, but the risk remains significant due to the ease of exploitation and potential impact on sensitive firewall management functions.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the security of network perimeter defenses managed by Palo Alto Networks Cloud NGFW devices. Unauthorized access to the management interface can lead to exposure of sensitive configuration data, potential manipulation of firewall rules, and leakage of confidential information, undermining network integrity and confidentiality. This can facilitate further attacks such as lateral movement, data exfiltration, or disruption of network security policies. Organizations in sectors with high regulatory requirements for data protection (e.g., finance, healthcare, critical infrastructure) face increased compliance risks and potential legal consequences if exploited. The vulnerability's network-based attack vector and lack of required authentication make it particularly dangerous in environments where management interfaces are exposed or insufficiently segmented. Given the widespread use of Palo Alto Networks NGFWs in Europe, especially in large enterprises and government agencies, the impact could be broad if mitigations are not applied promptly.

Mitigation Recommendations

1. Immediately restrict access to the PAN-OS management web interface to trusted internal IP addresses only, using network segmentation and firewall rules to block unauthorized external access. 2. Implement VPN or jump host solutions for remote management access to ensure secure, authenticated connections. 3. Regularly audit and monitor access logs for unusual or unauthorized access attempts to the management interface. 4. Follow Palo Alto Networks' official best practices for securing management access, including disabling unnecessary services and enforcing strong authentication where applicable. 5. Keep PAN-OS software up to date with the latest security patches once available, even though no patch is currently listed. 6. Conduct penetration testing and vulnerability assessments focusing on management interfaces to identify and remediate exposure. 7. Educate network administrators on the risks of exposing management interfaces and enforce strict operational security policies. 8. Consider deploying additional network security controls such as intrusion detection/prevention systems (IDS/IPS) to detect exploitation attempts targeting management interfaces.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
palo_alto
Date Reserved
2024-12-20T23:23:10.451Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68881726ad5a09ad0088bba5

Added to database: 7/29/2025, 12:34:46 AM

Last enriched: 10/21/2025, 8:00:16 PM

Last updated: 12/3/2025, 11:23:34 PM

Views: 48

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats