Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-0108: CWE-306 Missing Authentication for Critical Function in Palo Alto Networks Cloud NGFW

0
High
VulnerabilityCVE-2025-0108cvecve-2025-0108cwe-306
Published: Wed Feb 12 2025 (02/12/2025, 20:55:34 UTC)
Source: CVE Database V5
Vendor/Project: Palo Alto Networks
Product: Cloud NGFW

Description

An authentication bypass in the Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to bypass the authentication otherwise required by the PAN-OS management web interface and invoke certain PHP scripts. While invoking these PHP scripts does not enable remote code execution, it can negatively impact integrity and confidentiality of PAN-OS. You can greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended best practices deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 . This issue does not affect Cloud NGFW or Prisma Access software.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 23:22:56 UTC

Technical Analysis

CVE-2025-0108 is a vulnerability classified under CWE-306 (Missing Authentication for Critical Function) affecting Palo Alto Networks PAN-OS software's management web interface. This flaw allows an unauthenticated attacker with network access to the management interface to bypass the authentication mechanism and invoke specific PHP scripts. While these scripts do not permit remote code execution, their unauthorized invocation can compromise the confidentiality and integrity of the firewall's management functions, potentially exposing sensitive configuration data or allowing unauthorized changes. The vulnerability is specific to PAN-OS management web interface and does not impact Cloud NGFW or Prisma Access software. The CVSS 4.0 base score is 8.8, reflecting high severity due to network attack vector, no required privileges or user interaction, and significant confidentiality impact. The vulnerability was published on February 12, 2025, with no known exploits in the wild. Palo Alto Networks recommends mitigating this risk by restricting management interface access to trusted internal IP addresses, following their deployment best practices. No patches or updates are explicitly mentioned in the provided data, emphasizing the importance of network-level access controls. This vulnerability highlights the critical need to secure management interfaces of network security devices to prevent unauthorized administrative access.

Potential Impact

The primary impact of CVE-2025-0108 is unauthorized access to critical management functions of Palo Alto Networks PAN-OS firewalls, which can lead to confidentiality breaches and integrity violations. Attackers could potentially view sensitive configuration details, manipulate firewall rules, or disrupt security policies without authentication. Although remote code execution is not possible, the ability to invoke management PHP scripts without authentication can facilitate further attacks or lateral movement within a network. Organizations relying on PAN-OS for perimeter or internal network security could face increased risk of compromise, data leakage, or operational disruption. The vulnerability's network-based attack vector and lack of required privileges make it accessible to attackers with network access, increasing the threat surface. This could be particularly damaging in environments where management interfaces are exposed or insufficiently segmented. The absence of known exploits currently limits immediate widespread impact, but the high severity score and critical nature of firewall management functions necessitate urgent mitigation to prevent potential exploitation.

Mitigation Recommendations

1. Immediately restrict access to the PAN-OS management web interface to trusted internal IP addresses only, using firewall rules or network segmentation to block unauthorized network access. 2. Follow Palo Alto Networks' recommended best practices for securing management access, including the use of dedicated management networks or VPNs for administrative access. 3. Monitor and log all access attempts to the management interface to detect unusual or unauthorized activity promptly. 4. Implement multi-factor authentication (MFA) where supported to add an additional layer of security, even though this vulnerability bypasses authentication, layered defenses help overall security posture. 5. Regularly audit firewall configurations and management access policies to ensure compliance with security standards. 6. Stay informed on Palo Alto Networks security advisories for any patches or updates addressing this vulnerability and apply them promptly once available. 7. Consider deploying intrusion detection/prevention systems (IDS/IPS) to detect anomalous requests targeting management interfaces. 8. Educate network administrators about the risks of exposing management interfaces and enforce strict operational security policies.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
palo_alto
Date Reserved
2024-12-20T23:23:10.451Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68881726ad5a09ad0088bba5

Added to database: 7/29/2025, 12:34:46 AM

Last enriched: 2/26/2026, 11:22:56 PM

Last updated: 3/22/2026, 10:24:38 AM

Views: 78

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses