Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-0110: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Palo Alto Networks PAN-OS OpenConfig Plugin

0
High
VulnerabilityCVE-2025-0110cvecve-2025-0110cwe-78
Published: Wed Feb 12 2025 (02/12/2025, 21:04:42 UTC)
Source: CVE Database V5
Vendor/Project: Palo Alto Networks
Product: PAN-OS OpenConfig Plugin

Description

A command injection vulnerability in the Palo Alto Networks PAN-OS OpenConfig plugin enables an authenticated administrator with the ability to make gNMI requests to the PAN-OS management web interface to bypass system restrictions and run arbitrary commands. The commands are run as the “__openconfig” user (which has the Device Administrator role) on the firewall. You can greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended best practices deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 .

AI-Powered Analysis

AILast updated: 02/26/2026, 21:01:26 UTC

Technical Analysis

CVE-2025-0110 is an OS command injection vulnerability identified in the PAN-OS OpenConfig plugin version 1.0.0 by Palo Alto Networks. The flaw stems from improper neutralization of special characters in OS commands (CWE-78), allowing an authenticated administrator who can send gNMI requests via the PAN-OS management web interface to bypass system restrictions and execute arbitrary OS commands. These commands run under the __openconfig user account, which possesses Device Administrator role privileges, effectively granting full control over the firewall device. The vulnerability does not require additional authentication or user interaction beyond administrator access, making it easier to exploit if credentials are compromised or misused. The CVSS 4.0 score of 8.6 indicates a high-severity issue with significant impact on confidentiality, integrity, and availability of the affected systems. Although no public exploits have been reported yet, the potential for severe damage is substantial given the elevated privileges and control over firewall operations. Palo Alto Networks recommends mitigating this risk by restricting access to the management web interface to trusted internal IP addresses, following their best practice guidelines. This vulnerability highlights the critical need for strict access controls and monitoring on management interfaces of network security devices. Organizations should also monitor for updates or patches from Palo Alto Networks to remediate the vulnerability directly.

Potential Impact

The impact of CVE-2025-0110 is significant for organizations worldwide that deploy Palo Alto Networks firewalls with the PAN-OS OpenConfig plugin. Successful exploitation allows an attacker with administrator-level access to execute arbitrary OS commands with Device Administrator privileges, potentially leading to full compromise of the firewall device. This can result in unauthorized configuration changes, disabling of security controls, interception or manipulation of network traffic, and lateral movement within the network. The confidentiality, integrity, and availability of the firewall and the protected network segments are at high risk. Given the critical role of firewalls in network security, exploitation could facilitate further attacks on internal systems, data exfiltration, or disruption of business operations. The vulnerability’s exploitation requires authenticated access, but if credentials are compromised or insider threats exist, the risk escalates. The absence of known exploits in the wild currently limits immediate widespread impact, but the high severity score and privileged access level mean organizations must act promptly to mitigate exposure.

Mitigation Recommendations

To mitigate CVE-2025-0110, organizations should implement the following specific measures: 1) Restrict access to the PAN-OS management web interface strictly to trusted internal IP addresses using network segmentation and firewall rules, minimizing exposure to potential attackers. 2) Enforce strong authentication mechanisms and regularly audit administrator accounts to prevent credential compromise or misuse. 3) Monitor management interface access logs for unusual or unauthorized activity indicative of exploitation attempts. 4) Apply the principle of least privilege by limiting the number of administrators with gNMI request capabilities and Device Administrator roles. 5) Stay informed on Palo Alto Networks’ security advisories and apply patches or updates promptly once available to remediate the vulnerability directly. 6) Consider deploying additional network security controls such as intrusion detection/prevention systems (IDS/IPS) to detect anomalous command execution patterns. 7) Conduct regular security assessments and penetration testing focused on management interfaces to identify and remediate potential weaknesses. These targeted actions go beyond generic advice by focusing on access control hardening, monitoring, and proactive patch management specific to this vulnerability’s attack vector.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
palo_alto
Date Reserved
2024-12-20T23:23:12.347Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a0a44985912abc71d64ac4

Added to database: 2/26/2026, 7:51:37 PM

Last enriched: 2/26/2026, 9:01:26 PM

Last updated: 2/26/2026, 11:15:24 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses