CVE-2025-0110: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Palo Alto Networks PAN-OS OpenConfig Plugin
A command injection vulnerability in the Palo Alto Networks PAN-OS OpenConfig plugin enables an authenticated administrator with the ability to make gNMI requests to the PAN-OS management web interface to bypass system restrictions and run arbitrary commands. The commands are run as the “__openconfig” user (which has the Device Administrator role) on the firewall. You can greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended best practices deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 .
AI Analysis
Technical Summary
CVE-2025-0110 is an OS command injection vulnerability identified in the PAN-OS OpenConfig plugin version 1.0.0 by Palo Alto Networks. The flaw stems from improper neutralization of special characters in OS commands (CWE-78), allowing an authenticated administrator who can send gNMI requests via the PAN-OS management web interface to bypass system restrictions and execute arbitrary OS commands. These commands run under the __openconfig user account, which possesses Device Administrator role privileges, effectively granting full control over the firewall device. The vulnerability does not require additional authentication or user interaction beyond administrator access, making it easier to exploit if credentials are compromised or misused. The CVSS 4.0 score of 8.6 indicates a high-severity issue with significant impact on confidentiality, integrity, and availability of the affected systems. Although no public exploits have been reported yet, the potential for severe damage is substantial given the elevated privileges and control over firewall operations. Palo Alto Networks recommends mitigating this risk by restricting access to the management web interface to trusted internal IP addresses, following their best practice guidelines. This vulnerability highlights the critical need for strict access controls and monitoring on management interfaces of network security devices. Organizations should also monitor for updates or patches from Palo Alto Networks to remediate the vulnerability directly.
Potential Impact
The impact of CVE-2025-0110 is significant for organizations worldwide that deploy Palo Alto Networks firewalls with the PAN-OS OpenConfig plugin. Successful exploitation allows an attacker with administrator-level access to execute arbitrary OS commands with Device Administrator privileges, potentially leading to full compromise of the firewall device. This can result in unauthorized configuration changes, disabling of security controls, interception or manipulation of network traffic, and lateral movement within the network. The confidentiality, integrity, and availability of the firewall and the protected network segments are at high risk. Given the critical role of firewalls in network security, exploitation could facilitate further attacks on internal systems, data exfiltration, or disruption of business operations. The vulnerability’s exploitation requires authenticated access, but if credentials are compromised or insider threats exist, the risk escalates. The absence of known exploits in the wild currently limits immediate widespread impact, but the high severity score and privileged access level mean organizations must act promptly to mitigate exposure.
Mitigation Recommendations
To mitigate CVE-2025-0110, organizations should implement the following specific measures: 1) Restrict access to the PAN-OS management web interface strictly to trusted internal IP addresses using network segmentation and firewall rules, minimizing exposure to potential attackers. 2) Enforce strong authentication mechanisms and regularly audit administrator accounts to prevent credential compromise or misuse. 3) Monitor management interface access logs for unusual or unauthorized activity indicative of exploitation attempts. 4) Apply the principle of least privilege by limiting the number of administrators with gNMI request capabilities and Device Administrator roles. 5) Stay informed on Palo Alto Networks’ security advisories and apply patches or updates promptly once available to remediate the vulnerability directly. 6) Consider deploying additional network security controls such as intrusion detection/prevention systems (IDS/IPS) to detect anomalous command execution patterns. 7) Conduct regular security assessments and penetration testing focused on management interfaces to identify and remediate potential weaknesses. These targeted actions go beyond generic advice by focusing on access control hardening, monitoring, and proactive patch management specific to this vulnerability’s attack vector.
Affected Countries
United States, Canada, United Kingdom, Germany, Australia, Japan, South Korea, France, Netherlands, Singapore, India
CVE-2025-0110: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Palo Alto Networks PAN-OS OpenConfig Plugin
Description
A command injection vulnerability in the Palo Alto Networks PAN-OS OpenConfig plugin enables an authenticated administrator with the ability to make gNMI requests to the PAN-OS management web interface to bypass system restrictions and run arbitrary commands. The commands are run as the “__openconfig” user (which has the Device Administrator role) on the firewall. You can greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended best practices deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 .
AI-Powered Analysis
Technical Analysis
CVE-2025-0110 is an OS command injection vulnerability identified in the PAN-OS OpenConfig plugin version 1.0.0 by Palo Alto Networks. The flaw stems from improper neutralization of special characters in OS commands (CWE-78), allowing an authenticated administrator who can send gNMI requests via the PAN-OS management web interface to bypass system restrictions and execute arbitrary OS commands. These commands run under the __openconfig user account, which possesses Device Administrator role privileges, effectively granting full control over the firewall device. The vulnerability does not require additional authentication or user interaction beyond administrator access, making it easier to exploit if credentials are compromised or misused. The CVSS 4.0 score of 8.6 indicates a high-severity issue with significant impact on confidentiality, integrity, and availability of the affected systems. Although no public exploits have been reported yet, the potential for severe damage is substantial given the elevated privileges and control over firewall operations. Palo Alto Networks recommends mitigating this risk by restricting access to the management web interface to trusted internal IP addresses, following their best practice guidelines. This vulnerability highlights the critical need for strict access controls and monitoring on management interfaces of network security devices. Organizations should also monitor for updates or patches from Palo Alto Networks to remediate the vulnerability directly.
Potential Impact
The impact of CVE-2025-0110 is significant for organizations worldwide that deploy Palo Alto Networks firewalls with the PAN-OS OpenConfig plugin. Successful exploitation allows an attacker with administrator-level access to execute arbitrary OS commands with Device Administrator privileges, potentially leading to full compromise of the firewall device. This can result in unauthorized configuration changes, disabling of security controls, interception or manipulation of network traffic, and lateral movement within the network. The confidentiality, integrity, and availability of the firewall and the protected network segments are at high risk. Given the critical role of firewalls in network security, exploitation could facilitate further attacks on internal systems, data exfiltration, or disruption of business operations. The vulnerability’s exploitation requires authenticated access, but if credentials are compromised or insider threats exist, the risk escalates. The absence of known exploits in the wild currently limits immediate widespread impact, but the high severity score and privileged access level mean organizations must act promptly to mitigate exposure.
Mitigation Recommendations
To mitigate CVE-2025-0110, organizations should implement the following specific measures: 1) Restrict access to the PAN-OS management web interface strictly to trusted internal IP addresses using network segmentation and firewall rules, minimizing exposure to potential attackers. 2) Enforce strong authentication mechanisms and regularly audit administrator accounts to prevent credential compromise or misuse. 3) Monitor management interface access logs for unusual or unauthorized activity indicative of exploitation attempts. 4) Apply the principle of least privilege by limiting the number of administrators with gNMI request capabilities and Device Administrator roles. 5) Stay informed on Palo Alto Networks’ security advisories and apply patches or updates promptly once available to remediate the vulnerability directly. 6) Consider deploying additional network security controls such as intrusion detection/prevention systems (IDS/IPS) to detect anomalous command execution patterns. 7) Conduct regular security assessments and penetration testing focused on management interfaces to identify and remediate potential weaknesses. These targeted actions go beyond generic advice by focusing on access control hardening, monitoring, and proactive patch management specific to this vulnerability’s attack vector.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- palo_alto
- Date Reserved
- 2024-12-20T23:23:12.347Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69a0a44985912abc71d64ac4
Added to database: 2/26/2026, 7:51:37 PM
Last enriched: 2/26/2026, 9:01:26 PM
Last updated: 2/26/2026, 11:15:24 PM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-3268: Improper Access Controls in psi-probe PSI Probe
MediumCVE-2026-28280: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in jmpsec osctrl
MediumCVE-2026-28279: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in jmpsec osctrl
HighCVE-2026-28276: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Morelitea initiative
HighCVE-2026-28275: CWE-613: Insufficient Session Expiration in Morelitea initiative
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.