Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-4235: CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere in Palo Alto Networks User-ID Credential Agent

0
High
VulnerabilityCVE-2025-4235cvecve-2025-4235cwe-497
Published: Fri Sep 12 2025 (09/12/2025, 17:16:53 UTC)
Source: CVE Database V5
Vendor/Project: Palo Alto Networks
Product: User-ID Credential Agent

Description

An information exposure vulnerability in the Palo Alto Networks User-ID Credential Agent (Windows-based) can expose the service account password under specific non-default configurations. This allows an unprivileged Domain User to escalate privileges by exploiting the account’s permissions. The impact varies by configuration: * Minimally Privileged Accounts: Enable disruption of User-ID Credential Agent operations (e.g., uninstalling or disabling the agent service), weakening network security policies that leverage Credential Phishing Prevention https://docs.paloaltonetworks.com/advanced-url-filtering/administration/url-filtering-features/credential-phishing-prevention under a Domain Credential Filter https://docs.paloaltonetworks.com/advanced-url-filtering/administration/url-filtering-features/credential-phishing-prevention/methods-to-check-for-corporate-credential-submissions configuration. * Elevated Accounts (Server Operator, Domain Join, Legacy Features): Permit increased impacts, including server control (e.g., shutdown/restart), domain manipulation (e.g., rogue computer objects), and network compromise via reconnaissance or client probing.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 03:07:03 UTC

Technical Analysis

CVE-2025-4235 is a vulnerability classified under CWE-497 (Exposure of Sensitive System Information to an Unauthorized Control Sphere) affecting the Palo Alto Networks User-ID Credential Agent on Windows platforms. This agent is responsible for integrating user identity information into Palo Alto Networks security policies. The vulnerability arises when the service account password is exposed due to specific non-default configurations, allowing an unprivileged Domain User to obtain sensitive credentials. Once the password is exposed, the attacker can escalate privileges based on the permissions assigned to the service account. For minimally privileged accounts, attackers can disrupt the User-ID Credential Agent service, potentially uninstalling or disabling it, which undermines security features such as Credential Phishing Prevention under Domain Credential Filter configurations. For accounts with elevated privileges (e.g., Server Operator, Domain Join, Legacy Features), the attacker can perform more severe actions including server shutdown or restart, creation of rogue computer objects in the domain, and reconnaissance or probing of network clients, potentially leading to broader network compromise. The vulnerability requires local access with low privileges and does not require user interaction. The CVSS 4.0 vector indicates low attack complexity, partial privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. No patches or exploits are currently documented, but the vulnerability is publicly disclosed and rated high severity.

Potential Impact

The vulnerability poses a significant risk to organizations using Palo Alto Networks User-ID Credential Agent, especially those with non-default configurations that expose service account credentials. Attackers with low-level domain access can escalate privileges, potentially gaining control over critical servers and domain infrastructure. This can lead to disruption of security enforcement mechanisms, weakening defenses against credential phishing and other attacks. Elevated privilege exploitation can result in domain manipulation, unauthorized server control, and network reconnaissance, increasing the risk of lateral movement and widespread compromise. The impact extends to confidentiality, integrity, and availability of network security operations, potentially affecting sensitive corporate data and critical infrastructure. Organizations relying on Palo Alto Networks security policies that integrate User-ID information are particularly at risk, as disabling or uninstalling the agent can degrade security posture.

Mitigation Recommendations

Organizations should audit and review the configuration of the User-ID Credential Agent, ensuring service accounts have the least privilege necessary and avoid non-default configurations that expose passwords. Implement strict access controls to prevent unprivileged domain users from accessing service account credentials. Monitor and restrict permissions for accounts with elevated privileges such as Server Operator or Domain Join roles. Employ robust logging and alerting to detect unusual activities related to the User-ID Credential Agent service, including service stoppage or uninstallation attempts. Regularly update and patch Palo Alto Networks software as updates become available, even though no patches are currently listed, stay alert for vendor advisories. Consider isolating the User-ID Credential Agent service account from other critical domain roles to limit potential damage. Conduct periodic security assessments and penetration testing focused on privilege escalation paths involving service accounts. Finally, educate administrators on secure configuration best practices for Palo Alto Networks products to prevent inadvertent exposure.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
palo_alto
Date Reserved
2025-05-02T19:10:50.812Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c457e4c2c897903a232035

Added to database: 9/12/2025, 5:27:00 PM

Last enriched: 2/27/2026, 3:07:03 AM

Last updated: 3/24/2026, 6:06:46 AM

Views: 236

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses