Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-4230: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Palo Alto Networks Cloud NGFW

0
High
VulnerabilityCVE-2025-4230cvecve-2025-4230cwe-78
Published: Thu Jun 12 2025 (06/12/2025, 23:30:15 UTC)
Source: CVE Database V5
Vendor/Project: Palo Alto Networks
Product: Cloud NGFW

Description

A command injection vulnerability in Palo Alto Networks PAN-OS® software enables an authenticated administrator to bypass system restrictions and run arbitrary commands as a root user. To be able to exploit this issue, the user must have access to the PAN-OS CLI. The security risk posed by this issue is significantly minimized when CLI access is restricted to a limited group of administrators. Cloud NGFW and Prisma® Access are not affected by this vulnerability.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 03:06:10 UTC

Technical Analysis

CVE-2025-4230 is an OS command injection vulnerability classified under CWE-78, discovered in Palo Alto Networks PAN-OS software specifically impacting the Cloud NGFW product line. The flaw allows an authenticated administrator with access to the PAN-OS command-line interface (CLI) to bypass system restrictions and execute arbitrary operating system commands with root privileges. This occurs due to improper neutralization of special elements in OS commands, enabling injection attacks. The vulnerability does not affect Prisma Access or other Palo Alto Networks products outside Cloud NGFW. Exploitation requires high privileges (administrator CLI access) and does not require user interaction, but the attacker must already be authenticated and authorized to use the CLI. The CVSS v4.0 score of 8.4 reflects a high severity, with significant impacts on confidentiality, integrity, and availability of the affected systems. No public exploits or active exploitation have been reported yet. The risk is mitigated when CLI access is restricted to a minimal set of trusted administrators. Palo Alto Networks has not yet published patches, but organizations are advised to monitor for updates and apply them promptly once available.

Potential Impact

If exploited, this vulnerability allows an authenticated administrator to execute arbitrary commands as root on the affected PAN-OS system, potentially leading to full system compromise. This can result in unauthorized data access, modification, or deletion, disruption of firewall operations, and lateral movement within the network. The root-level command execution could allow attackers to disable security controls, exfiltrate sensitive information, or deploy persistent malware. Given the critical role of Cloud NGFW in network security, exploitation could severely impact organizational security posture, leading to data breaches, service outages, and regulatory compliance violations. The requirement for authenticated CLI access limits the attack surface but insider threats or compromised administrator credentials could enable exploitation. The absence of known exploits in the wild reduces immediate risk but does not eliminate it, especially in high-value targets.

Mitigation Recommendations

Organizations should immediately audit and restrict PAN-OS CLI access to the smallest possible group of trusted administrators, enforcing strong authentication and access controls. Implement multi-factor authentication (MFA) for all administrator accounts to reduce the risk of credential compromise. Monitor CLI access logs for unusual or unauthorized activity. Network segmentation and strict firewall policies should limit administrative access to PAN-OS devices. Until patches are released, consider disabling or limiting CLI access where feasible. Stay informed via Palo Alto Networks security advisories and apply official patches promptly once available. Conduct regular security training for administrators to recognize and prevent misuse of privileged access. Employ endpoint detection and response (EDR) solutions to detect anomalous command executions indicative of exploitation attempts. Finally, maintain robust backup and recovery procedures to mitigate potential damage from successful attacks.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
palo_alto
Date Reserved
2025-05-02T19:10:43.398Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 684b64f2358c65714e6b22df

Added to database: 6/12/2025, 11:38:26 PM

Last enriched: 2/27/2026, 3:06:10 AM

Last updated: 3/25/2026, 1:35:19 AM

Views: 134

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses