Action not permitted
Modal body text goes here.
Modal Title
Modal Body
wid-sec-w-2025-1313
Vulnerability from csaf_certbund
Published
2025-06-11 22:00
Modified
2025-06-11 22:00
Summary
PaloAlto Networks PAN-OS: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
PAN-OS ist das Betriebssystem der Sicherheitssysteme / Firewalls der Firma Palo Alto Networks.
Angriff
Ein entfernter Angreifer kann mehrere Schwachstellen in PaloAlto Networks PAN-OS ausnutzen, um Informationen offenzulegen, oder beliebigen Programmcode als "root" auszuführen.
Betroffene Betriebssysteme
- Sonstiges
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "PAN-OS ist das Betriebssystem der Sicherheitssysteme / Firewalls der Firma Palo Alto Networks.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter Angreifer kann mehrere Schwachstellen in PaloAlto Networks PAN-OS ausnutzen, um Informationen offenzulegen, oder beliebigen Programmcode als \"root\" auszuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2025-1313 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-1313.json" }, { "category": "self", "summary": "WID-SEC-2025-1313 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1313" }, { "category": "external", "summary": "Palo Alto Networks Security Advisory CVE-2025-4229 vom 2025-06-11", "url": "https://security.paloaltonetworks.com/CVE-2025-4229" }, { "category": "external", "summary": "Palo Alto Networks Security Advisory CVE-2025-4230 vom 2025-06-11", "url": "https://security.paloaltonetworks.com/CVE-2025-4230" }, { "category": "external", "summary": "Palo Alto Networks Security Advisory CVE-2025-4231 vom 2025-06-11", "url": "https://security.paloaltonetworks.com/CVE-2025-4231" } ], "source_lang": "en-US", "title": "PaloAlto Networks PAN-OS: Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-06-11T22:00:00.000+00:00", "generator": { "date": "2025-06-12T11:18:39.562+00:00", "engine": { "name": "BSI-WID", "version": "1.3.12" } }, "id": "WID-SEC-W-2025-1313", "initial_release_date": "2025-06-11T22:00:00.000+00:00", "revision_history": [ { "date": "2025-06-11T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c11.2.7", "product": { "name": "PaloAlto Networks PAN-OS \u003c11.2.7", "product_id": "T044579" } }, { "category": "product_version", "name": "11.2.7", "product": { "name": "PaloAlto Networks PAN-OS 11.2.7", "product_id": "T044579-fixed", "product_identification_helper": { "cpe": "cpe:/o:paloaltonetworks:pan-os:11.2.7" } } }, { "category": "product_version_range", "name": "\u003c11.1.10", "product": { "name": "PaloAlto Networks PAN-OS \u003c11.1.10", "product_id": "T044580" } }, { "category": "product_version", "name": "11.1.10", "product": { "name": "PaloAlto Networks PAN-OS 11.1.10", "product_id": "T044580-fixed", "product_identification_helper": { "cpe": "cpe:/o:paloaltonetworks:pan-os:11.1.10" } } }, { "category": "product_version_range", "name": "\u003c10.2.17", "product": { "name": "PaloAlto Networks PAN-OS \u003c10.2.17", "product_id": "T044581" } }, { "category": "product_version", "name": "10.2.17", "product": { "name": "PaloAlto Networks PAN-OS 10.2.17", "product_id": "T044581-fixed", "product_identification_helper": { "cpe": "cpe:/o:paloaltonetworks:pan-os:10.2.17" } } }, { "category": "product_version_range", "name": "\u003c10.1.14-h16", "product": { "name": "PaloAlto Networks PAN-OS \u003c10.1.14-h16", "product_id": "T044582" } }, { "category": "product_version", "name": "10.1.14-h16", "product": { "name": "PaloAlto Networks PAN-OS 10.1.14-h16", "product_id": "T044582-fixed", "product_identification_helper": { "cpe": "cpe:/o:paloaltonetworks:pan-os:10.1.14-h16" } } }, { "category": "product_version_range", "name": "\u003c11.2.6", "product": { "name": "PaloAlto Networks PAN-OS \u003c11.2.6", "product_id": "T044583" } }, { "category": "product_version", "name": "11.2.6", "product": { "name": "PaloAlto Networks PAN-OS 11.2.6", "product_id": "T044583-fixed", "product_identification_helper": { "cpe": "cpe:/o:paloaltonetworks:pan-os:11.2.6" } } }, { "category": "product_version_range", "name": "\u003c10.2.14", "product": { "name": "PaloAlto Networks PAN-OS \u003c10.2.14", "product_id": "T044584" } }, { "category": "product_version", "name": "10.2.14", "product": { "name": "PaloAlto Networks PAN-OS 10.2.14", "product_id": "T044584-fixed", "product_identification_helper": { "cpe": "cpe:/o:paloaltonetworks:pan-os:10.2.14" } } }, { "category": "product_version_range", "name": "\u003c10.1.14-h15", "product": { "name": "PaloAlto Networks PAN-OS \u003c10.1.14-h15", "product_id": "T044585" } }, { "category": "product_version", "name": "10.1.14-h15", "product": { "name": "PaloAlto Networks PAN-OS 10.1.14-h15", "product_id": "T044585-fixed", "product_identification_helper": { "cpe": "cpe:/o:paloaltonetworks:pan-os:10.1.14-h15" } } }, { "category": "product_version_range", "name": "\u003c11.0.3", "product": { "name": "PaloAlto Networks PAN-OS \u003c11.0.3", "product_id": "T044586" } }, { "category": "product_version", "name": "11.0.3", "product": { "name": "PaloAlto Networks PAN-OS 11.0.3", "product_id": "T044586-fixed", "product_identification_helper": { "cpe": "cpe:/o:paloaltonetworks:pan-os:11.0.3" } } }, { "category": "product_version_range", "name": "\u003c10.2.8", "product": { "name": "PaloAlto Networks PAN-OS \u003c10.2.8", "product_id": "T044587" } }, { "category": "product_version", "name": "10.2.8", "product": { "name": "PaloAlto Networks PAN-OS 10.2.8", "product_id": "T044587-fixed", "product_identification_helper": { "cpe": "cpe:/o:paloaltonetworks:pan-os:10.2.8" } } } ], "category": "product_name", "name": "PAN-OS" } ], "category": "vendor", "name": "PaloAlto Networks" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-4229", "product_status": { "known_affected": [ "T044579", "T044580", "T044582", "T044581" ] }, "release_date": "2025-06-11T22:00:00.000+00:00", "title": "CVE-2025-4229" }, { "cve": "CVE-2025-4230", "product_status": { "known_affected": [ "T044580", "T044584", "T044583", "T044585" ] }, "release_date": "2025-06-11T22:00:00.000+00:00", "title": "CVE-2025-4230" }, { "cve": "CVE-2025-4231", "product_status": { "known_affected": [ "T044587", "T044586" ] }, "release_date": "2025-06-11T22:00:00.000+00:00", "title": "CVE-2025-4231" } ] }
CVE-2025-4229 (GCVE-0-2025-4229)
Vulnerability from cvelistv5
Published
2025-06-13 05:42
Modified
2025-06-13 19:04
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-497 - Exposure of Sensitive System Information to an Unauthorized Control Sphere
Summary
An information disclosure vulnerability in the SD-WAN feature of Palo Alto Networks PAN-OS® software enables an unauthorized user to view unencrypted data sent from the firewall through the SD-WAN interface. This requires the user to be able to intercept packets sent from the firewall.
Cloud NGFW and Prisma® Access are not affected by this vulnerability.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Palo Alto Networks | Cloud NGFW |
Patch: All |
|||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-4229", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-06-13T19:04:35.901390Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-13T19:04:49.865Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Cloud NGFW", "vendor": "Palo Alto Networks", "versions": [ { "status": "unaffected", "version": "All", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:palo_alto_networks:pan-os:11.2.6:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:11.2.5:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:11.2.3:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:11.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:11.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:11.2.0:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:11.1.9:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:11.1.8:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:11.1.5:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:11.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:11.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:11.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:11.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.2.16:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.2.15:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.2.14:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.2.12:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.2.11:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.2.9:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.2.8:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.2.6:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.2.5:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.2.4:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.2.3:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.2.0:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:h15:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:h14:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:h13:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:h11:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:h10:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:h9:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:h8:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:h7:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:h6:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:h5:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:h4:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:h3:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:h2:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:h1:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:-:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.1.13:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.1.12:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.1.11:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.1.10:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.1.9:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.1.8:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.1.7:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.1.6:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.1.5:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.1.4:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.1.0:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "PAN-OS", "vendor": "Palo Alto Networks", "versions": [ { "changes": [ { "at": "11.2.7", "status": "unaffected" } ], "lessThan": "11.2.7", "status": "affected", "version": "11.2.0", "versionType": "custom" }, { "changes": [ { "at": "11.1.10", "status": "unaffected" } ], "lessThan": "11.1.10", "status": "affected", "version": "11.1.0", "versionType": "custom" }, { "changes": [ { "at": "10.2.17", "status": "unaffected" } ], "lessThan": "10.2.17", "status": "affected", "version": "10.2.0", "versionType": "custom" }, { "changes": [ { "at": "10.1.14-h16", "status": "unaffected" } ], "lessThan": "10.1.14-h16", "status": "affected", "version": "10.1.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "Prisma Access", "vendor": "Palo Alto Networks", "versions": [ { "status": "unaffected", "version": "All", "versionType": "custom" } ] } ], "configurations": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eTo be vulnerable to this issue, an SD-WAN Interface Profile must be configured on PAN-OS. The interface must also be configured for Direct Internet Access (DIA). Adding an SD-WAN Interface Profile requires the Advanced SD-WAN License.\u003cbr\u003e\u003c/p\u003e\u003cp\u003eYou can verify whether you configured an SD-WAN Interface Profile by checking for entries in your firewall web interface (Network \u2192 Network Profiles \u2192 SD-WAN Interface Profile).\u003cbr\u003e\u003c/p\u003e\u003cb\u003e\u003c/b\u003e\u003cp\u003eTo verify if you have Direct Internet Access, see our documentation about \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://docs.paloaltonetworks.com/sd-wan/administration/configure-direct-internet-access\"\u003econfiguring Direct Internet Access\u003c/a\u003e.\u003cbr\u003e\u003c/p\u003e\u003cb\u003e\u003c/b\u003e\u003cp\u003e\u003c/p\u003e" } ], "value": "To be vulnerable to this issue, an SD-WAN Interface Profile must be configured on PAN-OS. The interface must also be configured for Direct Internet Access (DIA). Adding an SD-WAN Interface Profile requires the Advanced SD-WAN License.\n\n\nYou can verify whether you configured an SD-WAN Interface Profile by checking for entries in your firewall web interface (Network \u2192 Network Profiles \u2192 SD-WAN Interface Profile).\n\n\nTo verify if you have Direct Internet Access, see our documentation about configuring Direct Internet Access https://docs.paloaltonetworks.com/sd-wan/administration/configure-direct-internet-access ." } ], "credits": [ { "lang": "en", "type": "finder", "value": "MMS Technology" } ], "datePublic": "2025-06-11T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eAn information disclosure vulnerability in the SD-WAN feature of Palo Alto Networks PAN-OS\u00ae software enables an unauthorized user to view unencrypted data sent from the firewall through the SD-WAN interface. This requires the user to be able to intercept packets sent from the firewall.\u003c/p\u003e\u003cp\u003eCloud NGFW and Prisma\u00ae Access are not affected by this vulnerability.\u003c/p\u003e" } ], "value": "An information disclosure vulnerability in the SD-WAN feature of Palo Alto Networks PAN-OS\u00ae software enables an unauthorized user to view unencrypted data sent from the firewall through the SD-WAN interface. This requires the user to be able to intercept packets sent from the firewall.\n\nCloud NGFW and Prisma\u00ae Access are not affected by this vulnerability." } ], "exploits": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue." } ], "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue." } ], "impacts": [ { "capecId": "CAPEC-37", "descriptions": [ { "lang": "en", "value": "CAPEC-37 Retrieve Embedded Sensitive Data" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NO", "Recovery": "USER", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "PRESENT", "attackVector": "NETWORK", "baseScore": 6, "baseSeverity": "MEDIUM", "privilegesRequired": "NONE", "providerUrgency": "AMBER", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "PASSIVE", "valueDensity": "DIFFUSE", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/AU:N/R:U/V:D/U:Amber", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "NONE", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-497", "description": "CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-13T05:42:38.482Z", "orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "shortName": "palo_alto" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2025-4229" } ], "solutions": [ { "lang": "eng", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003ctable\u003e\u003cthead\u003e\u003ctr\u003e\u003cth\u003eVersion\u003cbr\u003e\u003c/th\u003e\u003cth\u003eMinor Version\u003cbr\u003e\u003c/th\u003e\u003cth\u003eSuggested Solution\u003cbr\u003e\u003c/th\u003e\u003c/tr\u003e\u003c/thead\u003e\u003ctbody\u003e\u003ctr\u003e\u003ctd\u003eCloud NGFW All\u003cbr\u003e\u003c/td\u003e\u003ctd\u003e\u003c/td\u003e\u003ctd\u003eNo action needed.\u003c/td\u003e\u003c/tr\u003e\u003ctr\u003e\n \u003ctd\u003ePAN-OS 11.2\u003cbr\u003e\u003c/td\u003e\n \u003ctd\u003e11.2.0 through 11.2.6\u003c/td\u003e\n \u003ctd\u003eUpgrade to 11.2.7 or later.\u003c/td\u003e\n \u003c/tr\u003e\u003ctr\u003e\n \u003ctd\u003ePAN-OS 11.1\u003cbr\u003e\u003c/td\u003e\n \u003ctd\u003e11.1.0 through 11.1.9\u003c/td\u003e\n \u003ctd\u003eUpgrade to 11.1.10 or later.\u003c/td\u003e\n \u003c/tr\u003e\u003ctr\u003e\n \u003ctd\u003ePAN-OS 10.2\u003cbr\u003e\u003c/td\u003e\n \u003ctd\u003e10.2.0 through 10.2.16\u003c/td\u003e\n \u003ctd\u003eUpgrade to 10.2.17 or later.\u003c/td\u003e\n \u003c/tr\u003e\u003ctr\u003e\n \u003ctd\u003ePAN-OS 10.1\u003cbr\u003e\u003c/td\u003e\n \u003ctd\u003e10.1.0 through 10.1.14\u003c/td\u003e\n \u003ctd\u003eUpgrade to 10.1.14-h16 or later.\u003c/td\u003e\n \u003c/tr\u003e\u003ctr\u003e\u003ctd\u003eAll older\u003cbr\u003eunsupported\u003cbr\u003ePAN-OS versions\u003c/td\u003e\u003ctd\u003e\u0026nbsp;\u003c/td\u003e\u003ctd\u003eUpgrade to a supported fixed version.\u003c/td\u003e\u003c/tr\u003e\u003ctr\u003e\u003ctd\u003ePrisma Access All\u003cbr\u003e\u003c/td\u003e\u003ctd\u003e\u003c/td\u003e\u003ctd\u003eNo action needed.\u003c/td\u003e\u003c/tr\u003e\u003c/tbody\u003e\u003c/table\u003e" } ], "value": "Version\nMinor Version\nSuggested Solution\nCloud NGFW All\nNo action needed.\n PAN-OS 11.2\n\n 11.2.0 through 11.2.6\n Upgrade to 11.2.7 or later.\n \n PAN-OS 11.1\n\n 11.1.0 through 11.1.9\n Upgrade to 11.1.10 or later.\n \n PAN-OS 10.2\n\n 10.2.0 through 10.2.16\n Upgrade to 10.2.17 or later.\n \n PAN-OS 10.1\n\n 10.1.0 through 10.1.14\n Upgrade to 10.1.14-h16 or later.\n All older\nunsupported\nPAN-OS versions\u00a0Upgrade to a supported fixed version.Prisma Access All\nNo action needed." } ], "source": { "defect": [ "PAN-284744" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2025-06-11T16:00:00.000Z", "value": "Initial Publication" } ], "title": "PAN-OS: Traffic Information Disclosure Vulnerability", "workarounds": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eIf you are not using the SD-WAN feature of PAN-OS, you can mitigate this issue by disabling the SD-WAN feature. To disable SD-WAN feature, see our documentation about\u0026nbsp;\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://docs.paloaltonetworks.com/sd-wan/activation-and-onboarding/uninstall-the-sd-wan-plugin\"\u003euninstalling SD-WAN plugin\u003c/a\u003e.\u003c/p\u003e\u003cp\u003eIf you are using the SD-WAN feature but do not need Direct Internet Access, you can mitigate the issue by disabling Direct Internet Access on the SD-WAN Interface Profile by \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://docs.paloaltonetworks.com/sd-wan/administration/configure-direct-internet-access/backhaul-your-internet-traffic-to-sd-wan-hub\"\u003ebackhauling your internet traffic to SD-WAN hub\u003c/a\u003e.\u003c/p\u003e" } ], "value": "If you are not using the SD-WAN feature of PAN-OS, you can mitigate this issue by disabling the SD-WAN feature. To disable SD-WAN feature, see our documentation about\u00a0 uninstalling SD-WAN plugin https://docs.paloaltonetworks.com/sd-wan/activation-and-onboarding/uninstall-the-sd-wan-plugin .\n\nIf you are using the SD-WAN feature but do not need Direct Internet Access, you can mitigate the issue by disabling Direct Internet Access on the SD-WAN Interface Profile by backhauling your internet traffic to SD-WAN hub https://docs.paloaltonetworks.com/sd-wan/administration/configure-direct-internet-access/backhaul-your-internet-traffic-to-sd-wan-hub ." } ], "x_affectedList": [ "PAN-OS 11.2.6", "PAN-OS 11.2.5", "PAN-OS 11.2.4-h8", "PAN-OS 11.2.4-h7", "PAN-OS 11.2.4-h6", "PAN-OS 11.2.4-h5", "PAN-OS 11.2.4-h4", "PAN-OS 11.2.4-h3", "PAN-OS 11.2.4-h2", "PAN-OS 11.2.4-h1", "PAN-OS 11.2.4", "PAN-OS 11.2.3-h5", "PAN-OS 11.2.3-h4", "PAN-OS 11.2.3-h3", "PAN-OS 11.2.3-h2", "PAN-OS 11.2.3-h1", "PAN-OS 11.2.3", "PAN-OS 11.2.2-h2", "PAN-OS 11.2.2-h1", "PAN-OS 11.2.1-h1", "PAN-OS 11.2.1", "PAN-OS 11.2.0-h1", "PAN-OS 11.2.0", "PAN-OS 11.1.9", "PAN-OS 11.1.8", "PAN-OS 11.1.6-h10", "PAN-OS 11.1.6-h7", "PAN-OS 11.1.6-h6", "PAN-OS 11.1.6-h4", "PAN-OS 11.1.6-h3", "PAN-OS 11.1.6-h2", "PAN-OS 11.1.6-h1", "PAN-OS 11.1.6", "PAN-OS 11.1.5-h1", "PAN-OS 11.1.5", "PAN-OS 11.1.4-h18", "PAN-OS 11.1.4-h17", "PAN-OS 11.1.4-h15", "PAN-OS 11.1.4-h13", "PAN-OS 11.1.4-h12", "PAN-OS 11.1.4-h11", "PAN-OS 11.1.4-h10", "PAN-OS 11.1.4-h9", "PAN-OS 11.1.4-h8", "PAN-OS 11.1.4-h7", "PAN-OS 11.1.4-h6", "PAN-OS 11.1.4-h5", "PAN-OS 11.1.4-h4", "PAN-OS 11.1.4-h3", "PAN-OS 11.1.4-h2", "PAN-OS 11.1.4-h1", "PAN-OS 11.1.4", "PAN-OS 11.1.3-h13", "PAN-OS 11.1.3-h12", "PAN-OS 11.1.3-h11", "PAN-OS 11.1.3-h10", "PAN-OS 11.1.3-h9", "PAN-OS 11.1.3-h8", "PAN-OS 11.1.3-h7", "PAN-OS 11.1.3-h6", "PAN-OS 11.1.3-h5", "PAN-OS 11.1.3-h4", "PAN-OS 11.1.3-h3", "PAN-OS 11.1.3-h2", "PAN-OS 11.1.3-h1", "PAN-OS 11.1.3", "PAN-OS 11.1.2-h18", "PAN-OS 11.1.2-h17", "PAN-OS 11.1.2-h16", "PAN-OS 11.1.2-h15", "PAN-OS 11.1.2-h14", "PAN-OS 11.1.2-h13", "PAN-OS 11.1.2-h12", "PAN-OS 11.1.2-h11", "PAN-OS 11.1.2-h10", "PAN-OS 11.1.2-h9", "PAN-OS 11.1.2-h8", "PAN-OS 11.1.2-h7", "PAN-OS 11.1.2-h6", "PAN-OS 11.1.2-h5", "PAN-OS 11.1.2-h4", "PAN-OS 11.1.2-h3", "PAN-OS 11.1.2-h2", "PAN-OS 11.1.2-h1", "PAN-OS 11.1.2", "PAN-OS 11.1.1-h2", "PAN-OS 11.1.1-h1", "PAN-OS 11.1.1", "PAN-OS 11.1.0-h4", "PAN-OS 11.1.0-h3", "PAN-OS 11.1.0-h2", "PAN-OS 11.1.0-h1", "PAN-OS 11.1.0", "PAN-OS 10.2.16", "PAN-OS 10.2.15", "PAN-OS 10.2.14-h1", "PAN-OS 10.2.14", "PAN-OS 10.2.13-h10", "PAN-OS 10.2.13-h7", "PAN-OS 10.2.13-h5", "PAN-OS 10.2.13-h4", "PAN-OS 10.2.13-h3", "PAN-OS 10.2.13-h2", "PAN-OS 10.2.13-h1", "PAN-OS 10.2.13", "PAN-OS 10.2.12-h6", "PAN-OS 10.2.12-h5", "PAN-OS 10.2.12-h4", "PAN-OS 10.2.12-h3", "PAN-OS 10.2.12-h2", "PAN-OS 10.2.12-h1", "PAN-OS 10.2.12", "PAN-OS 10.2.11-h13", "PAN-OS 10.2.11-h12", "PAN-OS 10.2.11-h11", "PAN-OS 10.2.11-h10", "PAN-OS 10.2.11-h9", "PAN-OS 10.2.11-h8", "PAN-OS 10.2.11-h7", "PAN-OS 10.2.11-h6", "PAN-OS 10.2.11-h5", "PAN-OS 10.2.11-h4", "PAN-OS 10.2.11-h3", "PAN-OS 10.2.11-h2", "PAN-OS 10.2.11-h1", "PAN-OS 10.2.11", "PAN-OS 10.2.10-h21", "PAN-OS 10.2.10-h18", "PAN-OS 10.2.10-h17", "PAN-OS 10.2.10-h14", "PAN-OS 10.2.10-h13", "PAN-OS 10.2.10-h12", "PAN-OS 10.2.10-h11", "PAN-OS 10.2.10-h10", "PAN-OS 10.2.10-h9", "PAN-OS 10.2.10-h8", "PAN-OS 10.2.10-h7", "PAN-OS 10.2.10-h6", "PAN-OS 10.2.10-h5", "PAN-OS 10.2.10-h4", "PAN-OS 10.2.10-h3", "PAN-OS 10.2.10-h2", "PAN-OS 10.2.10-h1", "PAN-OS 10.2.10", "PAN-OS 10.2.9-h21", "PAN-OS 10.2.9-h20", "PAN-OS 10.2.9-h19", "PAN-OS 10.2.9-h18", "PAN-OS 10.2.9-h17", "PAN-OS 10.2.9-h16", "PAN-OS 10.2.9-h15", "PAN-OS 10.2.9-h14", "PAN-OS 10.2.9-h13", "PAN-OS 10.2.9-h12", "PAN-OS 10.2.9-h11", "PAN-OS 10.2.9-h10", "PAN-OS 10.2.9-h9", "PAN-OS 10.2.9-h8", "PAN-OS 10.2.9-h7", "PAN-OS 10.2.9-h6", "PAN-OS 10.2.9-h5", "PAN-OS 10.2.9-h4", "PAN-OS 10.2.9-h3", "PAN-OS 10.2.9-h2", "PAN-OS 10.2.9-h1", "PAN-OS 10.2.9", "PAN-OS 10.2.8-h21", "PAN-OS 10.2.8-h20", "PAN-OS 10.2.8-h19", "PAN-OS 10.2.8-h18", "PAN-OS 10.2.8-h17", "PAN-OS 10.2.8-h16", "PAN-OS 10.2.8-h15", "PAN-OS 10.2.8-h14", "PAN-OS 10.2.8-h13", "PAN-OS 10.2.8-h12", "PAN-OS 10.2.8-h11", "PAN-OS 10.2.8-h10", "PAN-OS 10.2.8-h9", "PAN-OS 10.2.8-h8", "PAN-OS 10.2.8-h7", "PAN-OS 10.2.8-h6", "PAN-OS 10.2.8-h5", "PAN-OS 10.2.8-h4", "PAN-OS 10.2.8-h3", "PAN-OS 10.2.8-h2", "PAN-OS 10.2.8-h1", "PAN-OS 10.2.8", "PAN-OS 10.2.7-h24", "PAN-OS 10.2.7-h23", "PAN-OS 10.2.7-h22", "PAN-OS 10.2.7-h21", "PAN-OS 10.2.7-h20", "PAN-OS 10.2.7-h19", "PAN-OS 10.2.7-h18", "PAN-OS 10.2.7-h17", "PAN-OS 10.2.7-h16", "PAN-OS 10.2.7-h15", "PAN-OS 10.2.7-h14", "PAN-OS 10.2.7-h13", "PAN-OS 10.2.7-h12", "PAN-OS 10.2.7-h11", "PAN-OS 10.2.7-h10", "PAN-OS 10.2.7-h9", "PAN-OS 10.2.7-h8", "PAN-OS 10.2.7-h7", "PAN-OS 10.2.7-h6", "PAN-OS 10.2.7-h5", "PAN-OS 10.2.7-h4", "PAN-OS 10.2.7-h3", "PAN-OS 10.2.7-h2", "PAN-OS 10.2.7-h1", "PAN-OS 10.2.7", "PAN-OS 10.2.6-h6", "PAN-OS 10.2.6-h5", "PAN-OS 10.2.6-h4", "PAN-OS 10.2.6-h3", "PAN-OS 10.2.6-h2", "PAN-OS 10.2.6-h1", "PAN-OS 10.2.6", "PAN-OS 10.2.5-h9", "PAN-OS 10.2.5-h8", "PAN-OS 10.2.5-h7", "PAN-OS 10.2.5-h6", "PAN-OS 10.2.5-h5", "PAN-OS 10.2.5-h4", "PAN-OS 10.2.5-h3", "PAN-OS 10.2.5-h2", "PAN-OS 10.2.5-h1", "PAN-OS 10.2.5", "PAN-OS 10.2.4-h32", "PAN-OS 10.2.4-h31", "PAN-OS 10.2.4-h30", "PAN-OS 10.2.4-h29", "PAN-OS 10.2.4-h28", "PAN-OS 10.2.4-h27", "PAN-OS 10.2.4-h26", "PAN-OS 10.2.4-h25", "PAN-OS 10.2.4-h24", "PAN-OS 10.2.4-h23", "PAN-OS 10.2.4-h22", "PAN-OS 10.2.4-h21", "PAN-OS 10.2.4-h20", "PAN-OS 10.2.4-h19", "PAN-OS 10.2.4-h18", "PAN-OS 10.2.4-h17", "PAN-OS 10.2.4-h16", "PAN-OS 10.2.4-h15", "PAN-OS 10.2.4-h14", "PAN-OS 10.2.4-h13", "PAN-OS 10.2.4-h12", "PAN-OS 10.2.4-h11", "PAN-OS 10.2.4-h10", "PAN-OS 10.2.4-h9", "PAN-OS 10.2.4-h8", "PAN-OS 10.2.4-h7", "PAN-OS 10.2.4-h6", "PAN-OS 10.2.4-h5", "PAN-OS 10.2.4-h4", "PAN-OS 10.2.4-h3", "PAN-OS 10.2.4-h2", "PAN-OS 10.2.4-h1", "PAN-OS 10.2.4", "PAN-OS 10.2.3-h14", "PAN-OS 10.2.3-h13", "PAN-OS 10.2.3-h12", "PAN-OS 10.2.3-h11", "PAN-OS 10.2.3-h10", "PAN-OS 10.2.3-h9", "PAN-OS 10.2.3-h8", "PAN-OS 10.2.3-h7", "PAN-OS 10.2.3-h6", "PAN-OS 10.2.3-h5", "PAN-OS 10.2.3-h4", "PAN-OS 10.2.3-h3", "PAN-OS 10.2.3-h2", "PAN-OS 10.2.3-h1", "PAN-OS 10.2.3", "PAN-OS 10.2.2-h6", "PAN-OS 10.2.2-h5", "PAN-OS 10.2.2-h4", "PAN-OS 10.2.2-h3", "PAN-OS 10.2.2-h2", "PAN-OS 10.2.2-h1", "PAN-OS 10.2.2", "PAN-OS 10.2.1-h3", "PAN-OS 10.2.1-h2", "PAN-OS 10.2.1-h1", "PAN-OS 10.2.1", "PAN-OS 10.2.0-h4", "PAN-OS 10.2.0-h3", "PAN-OS 10.2.0-h2", "PAN-OS 10.2.0-h1", "PAN-OS 10.2.0", "PAN-OS 10.1.14-h15", "PAN-OS 10.1.14-h14", "PAN-OS 10.1.14-h13", "PAN-OS 10.1.14-h11", "PAN-OS 10.1.14-h10", "PAN-OS 10.1.14-h9", "PAN-OS 10.1.14-h8", "PAN-OS 10.1.14-h7", "PAN-OS 10.1.14-h6", "PAN-OS 10.1.14-h5", "PAN-OS 10.1.14-h4", "PAN-OS 10.1.14-h3", "PAN-OS 10.1.14-h2", "PAN-OS 10.1.14-h1", "PAN-OS 10.1.14", "PAN-OS 10.1.13-h5", "PAN-OS 10.1.13-h4", "PAN-OS 10.1.13-h3", "PAN-OS 10.1.13-h2", "PAN-OS 10.1.13-h1", "PAN-OS 10.1.13", "PAN-OS 10.1.12-h3", "PAN-OS 10.1.12-h2", "PAN-OS 10.1.12-h1", "PAN-OS 10.1.12", "PAN-OS 10.1.11-h10", "PAN-OS 10.1.11-h9", "PAN-OS 10.1.11-h8", "PAN-OS 10.1.11-h7", "PAN-OS 10.1.11-h6", "PAN-OS 10.1.11-h5", "PAN-OS 10.1.11-h4", "PAN-OS 10.1.11-h3", "PAN-OS 10.1.11-h2", "PAN-OS 10.1.11-h1", "PAN-OS 10.1.11", "PAN-OS 10.1.10-h9", "PAN-OS 10.1.10-h8", "PAN-OS 10.1.10-h7", "PAN-OS 10.1.10-h6", "PAN-OS 10.1.10-h5", "PAN-OS 10.1.10-h4", "PAN-OS 10.1.10-h3", "PAN-OS 10.1.10-h2", "PAN-OS 10.1.10-h1", "PAN-OS 10.1.10", "PAN-OS 10.1.9-h14", "PAN-OS 10.1.9-h13", "PAN-OS 10.1.9-h12", "PAN-OS 10.1.9-h11", "PAN-OS 10.1.9-h10", "PAN-OS 10.1.9-h9", "PAN-OS 10.1.9-h8", "PAN-OS 10.1.9-h7", "PAN-OS 10.1.9-h6", "PAN-OS 10.1.9-h5", "PAN-OS 10.1.9-h4", "PAN-OS 10.1.9-h3", "PAN-OS 10.1.9-h2", "PAN-OS 10.1.9-h1", "PAN-OS 10.1.9", "PAN-OS 10.1.8-h8", "PAN-OS 10.1.8-h7", "PAN-OS 10.1.8-h6", "PAN-OS 10.1.8-h5", "PAN-OS 10.1.8-h4", "PAN-OS 10.1.8-h3", "PAN-OS 10.1.8-h2", "PAN-OS 10.1.8-h1", "PAN-OS 10.1.8", "PAN-OS 10.1.7-h1", "PAN-OS 10.1.7", "PAN-OS 10.1.6-h9", "PAN-OS 10.1.6-h8", "PAN-OS 10.1.6-h7", "PAN-OS 10.1.6-h6", "PAN-OS 10.1.6-h5", "PAN-OS 10.1.6-h4", "PAN-OS 10.1.6-h3", "PAN-OS 10.1.6-h2", "PAN-OS 10.1.6-h1", "PAN-OS 10.1.6", "PAN-OS 10.1.5-h4", "PAN-OS 10.1.5-h3", "PAN-OS 10.1.5-h2", "PAN-OS 10.1.5-h1", "PAN-OS 10.1.5", "PAN-OS 10.1.4-h6", "PAN-OS 10.1.4-h5", "PAN-OS 10.1.4-h4", "PAN-OS 10.1.4-h3", "PAN-OS 10.1.4-h2", "PAN-OS 10.1.4-h1", "PAN-OS 10.1.4", "PAN-OS 10.1.3-h4", "PAN-OS 10.1.3-h3", "PAN-OS 10.1.3-h2", "PAN-OS 10.1.3-h1", "PAN-OS 10.1.3", "PAN-OS 10.1.2", "PAN-OS 10.1.1", "PAN-OS 10.1.0" ], "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "assignerShortName": "palo_alto", "cveId": "CVE-2025-4229", "datePublished": "2025-06-13T05:42:38.482Z", "dateReserved": "2025-05-02T19:10:42.207Z", "dateUpdated": "2025-06-13T19:04:49.865Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-4231 (GCVE-0-2025-4231)
Vulnerability from cvelistv5
Published
2025-06-12 23:27
Modified
2025-06-13 13:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-77 - Improper Neutralization of Special Elements used in a Command ('Command Injection')
Summary
A command injection vulnerability in Palo Alto Networks PAN-OS® enables an authenticated administrative user to perform actions as the root user.
The attacker must have network access to the management web interface and successfully authenticate to exploit this issue.
Cloud NGFW and Prisma Access are not impacted by this vulnerability.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Palo Alto Networks | Cloud NGFW |
Patch: All < 6.3.3 |
|||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-4231", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-06-13T03:55:19.943513Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-13T13:32:58.253Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Cloud NGFW", "vendor": "Palo Alto Networks", "versions": [ { "changes": [ { "at": "6.3.3", "status": "unaffected" } ], "lessThan": "6.3.3", "status": "unaffected", "version": "All", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:palo_alto_networks:pan-os:11.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:11.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:11.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.2.6:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.2.5:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.2.4:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.2.3:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.2.0:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.1.13:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.1.12:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.1.11:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.1.10:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.1.9:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.1.8:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.1.7:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.1.6:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.1.5:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.1.4:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.1.0:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "PAN-OS", "vendor": "Palo Alto Networks", "versions": [ { "status": "unaffected", "version": "11.2.0", "versionType": "custom" }, { "status": "unaffected", "version": "11.1.0", "versionType": "custom" }, { "changes": [ { "at": "11.0.3", "status": "unaffected" } ], "lessThan": "11.0.3", "status": "affected", "version": "11.0.0", "versionType": "custom" }, { "changes": [ { "at": "10.2.8", "status": "unaffected" } ], "lessThan": "10.2.8", "status": "affected", "version": "10.2.0", "versionType": "custom" }, { "status": "affected", "version": "10.1.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "Prisma Access", "vendor": "Palo Alto Networks", "versions": [ { "status": "unaffected", "version": "All", "versionType": "custom" } ] } ], "configurations": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eThe risk is greatest if you allow access to the management web interface from the internet or from any untrusted network either:\u003c/p\u003e\u003col\u003e\u003cli\u003e\u003cp\u003eDirectly; or\u003c/p\u003e\u003c/li\u003e\u003cli\u003e\u003cp\u003eThrough a dataplane interface that includes a management interface profile.\u003c/p\u003e\u003c/li\u003e\u003c/ol\u003e\u003cp\u003eYou greatly reduce the risk if you ensure that you allow only trusted internal IP addresses to access the management web interface.\u003c/p\u003e\u003cp\u003eUse the following steps to identify your recently detected devices in our internet scans.\u003c/p\u003e\u003col\u003e\u003cli\u003e\u003cp\u003eTo find any assets that require remediation, visit the Assets section of the Customer Support Portal:\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://support.paloaltonetworks.com/\"\u003ehttps://support.paloaltonetworks.com\u003c/a\u003e\u0026nbsp;and then select Products \u2192 Assets \u2192 All Assets \u2192 Remediation Required).\u003c/p\u003e\u003c/li\u003e\u003cli\u003e\u003cp\u003eReview the list of your assets that we discovered in our scans to have an internet-facing management interface. We tagged these assets with \u2018PAN-SA-2024-0015\u2019 and a last seen timestamp (in UTC). If you do not see any such assets listed, then our scan did not find any devices associated with your account in the past three days that have an internet-facing management interface.\u003cbr\u003e\u003c/p\u003e\u003c/li\u003e\u003c/ol\u003e\u003cdiv\u003e\u003cp\u003eGlobalProtect\u2122 portals and gateways are not vulnerable to this issue. However, if you configure a management profile on interfaces with GlobalProtect portals or gateways, then you are exposing the firewall to attacks through the management web interface (typically accessible on port 4443).\u003c/p\u003e\u003c/div\u003e\u003cb\u003e\u003cp\u003e\u003c/p\u003e\u003c/b\u003e\u003cp\u003e\u003c/p\u003e" } ], "value": "The risk is greatest if you allow access to the management web interface from the internet or from any untrusted network either:\n\n * Directly; or\n\n\n * Through a dataplane interface that includes a management interface profile.\n\n\nYou greatly reduce the risk if you ensure that you allow only trusted internal IP addresses to access the management web interface.\n\nUse the following steps to identify your recently detected devices in our internet scans.\n\n * To find any assets that require remediation, visit the Assets section of the Customer Support Portal: https://support.paloaltonetworks.com https://support.paloaltonetworks.com/ \u00a0and then select Products \u2192 Assets \u2192 All Assets \u2192 Remediation Required).\n\n\n * Review the list of your assets that we discovered in our scans to have an internet-facing management interface. We tagged these assets with \u2018PAN-SA-2024-0015\u2019 and a last seen timestamp (in UTC). If you do not see any such assets listed, then our scan did not find any devices associated with your account in the past three days that have an internet-facing management interface.\n\n\n\nGlobalProtect\u2122 portals and gateways are not vulnerable to this issue. However, if you configure a management profile on interfaces with GlobalProtect portals or gateways, then you are exposing the firewall to attacks through the management web interface (typically accessible on port 4443)." } ], "credits": [ { "lang": "en", "type": "finder", "value": "spcnvdr" } ], "datePublic": "2025-06-11T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A command injection vulnerability in Palo Alto Networks PAN-OS\u00ae enables an authenticated administrative user to perform actions as the root user.\u003cbr\u003e\u003cbr\u003eThe attacker must have network access to the management web interface and successfully authenticate to exploit this issue.\u003cbr\u003e\u003cbr\u003eCloud NGFW and Prisma Access are not impacted by this vulnerability." } ], "value": "A command injection vulnerability in Palo Alto Networks PAN-OS\u00ae enables an authenticated administrative user to perform actions as the root user.\n\nThe attacker must have network access to the management web interface and successfully authenticate to exploit this issue.\n\nCloud NGFW and Prisma Access are not impacted by this vulnerability." } ], "exploits": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue." } ], "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue." } ], "impacts": [ { "capecId": "CAPEC-233", "descriptions": [ { "lang": "en", "value": "CAPEC-233 Privilege Escalation" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NO", "Recovery": "USER", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 8.6, "baseSeverity": "HIGH", "privilegesRequired": "HIGH", "providerUrgency": "AMBER", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "LOW", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "CONCENTRATED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:L/SI:N/SA:N/AU:N/R:U/V:C/RE:M/U:Amber", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "HIGH", "vulnerabilityResponseEffort": "MODERATE" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "The risk is highest when you allow access to the management interface from external IP addresses on the internet." } ] }, { "cvssV4_0": { "Automatable": "NO", "Recovery": "USER", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "PRESENT", "attackVector": "LOCAL", "baseScore": 7.1, "baseSeverity": "HIGH", "privilegesRequired": "HIGH", "providerUrgency": "AMBER", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "LOW", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "CONCENTRATED", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:L/SI:N/SA:N/AU:N/R:U/V:C/RE:M/U:Amber", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "HIGH", "vulnerabilityResponseEffort": "MODERATE" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "You can greatly reduce the risk of exploitation by restricting access to a jump box that is the only system allowed to access the management interface. This will ensure that attacks can succeed only if they obtain privileged access through those specified IP addresses." } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-77", "description": "CWE-77 Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-12T23:27:31.432Z", "orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "shortName": "palo_alto" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2025-4231" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003ctable\u003e\u003cthead\u003e\u003ctr\u003e\u003cth\u003eVersion\u003cbr\u003e\u003c/th\u003e\u003cth\u003eMinor Version\u003cbr\u003e\u003c/th\u003e\u003cth\u003eSuggested Solution\u003cbr\u003e\u003c/th\u003e\u003c/tr\u003e\u003c/thead\u003e\u003ctbody\u003e\u003ctr\u003e\u003ctd\u003ePAN-OS 11.2\u003cbr\u003e\u003c/td\u003e\u003ctd\u003e\u003c/td\u003e\u003ctd\u003eNo action needed.\u003c/td\u003e\u003c/tr\u003e\u003ctr\u003e\u003ctd\u003ePAN-OS 11.1\u003cbr\u003e\u003c/td\u003e\u003ctd\u003e\u003c/td\u003e\u003ctd\u003eNo action needed.\u003c/td\u003e\u003c/tr\u003e\u003ctr\u003e\n \u003ctd\u003ePAN-OS 11.0*\u003cbr\u003e\u003c/td\u003e\n \u003ctd\u003e11.0.0 through 11.0.2\u003c/td\u003e\n \u003ctd\u003eUpgrade to 11.0.3 or later.\u003c/td\u003e\n \u003c/tr\u003e\u003ctr\u003e\n \u003ctd\u003ePAN-OS 10.2\u003cbr\u003e\u003c/td\u003e\n \u003ctd\u003e10.2.0 through 10.2.7\u003c/td\u003e\n \u003ctd\u003eUpgrade to 10.2.8 or later.\u003c/td\u003e\n \u003c/tr\u003e\u003ctr\u003e\u003ctd\u003ePAN-OS 10.1\u003c/td\u003e\u003ctd\u003e\u003c/td\u003e\u003ctd\u003eUpgrade to 10.2.8 or 11.0.3 or later.\u003c/td\u003e\u003c/tr\u003e\u003ctr\u003e\u003ctd\u003eAll older\u003cbr\u003eunsupported\u003cbr\u003ePAN-OS versions\u003c/td\u003e\u003ctd\u003e\u0026nbsp;\u003c/td\u003e\u003ctd\u003eUpgrade to a supported fixed version.\u003c/td\u003e\u003c/tr\u003e\u003c/tbody\u003e\u003c/table\u003e\u003cbr\u003e\u003cp\u003e*PAN-OS 11.0 has reached EoL. We listed it here for completeness because a patch for PAN-OS 11.0 was released before it reached EoL. If you are still using any vulnerable EoL versions, we strongly recommend that you upgrade to a supported fixed PAN-OS version.\u003c/p\u003e" } ], "value": "Version\nMinor Version\nSuggested Solution\nPAN-OS 11.2\nNo action needed.PAN-OS 11.1\nNo action needed.\n PAN-OS 11.0*\n\n 11.0.0 through 11.0.2\n Upgrade to 11.0.3 or later.\n \n PAN-OS 10.2\n\n 10.2.0 through 10.2.7\n Upgrade to 10.2.8 or later.\n PAN-OS 10.1Upgrade to 10.2.8 or 11.0.3 or later.All older\nunsupported\nPAN-OS versions\u00a0Upgrade to a supported fixed version.\n*PAN-OS 11.0 has reached EoL. We listed it here for completeness because a patch for PAN-OS 11.0 was released before it reached EoL. If you are still using any vulnerable EoL versions, we strongly recommend that you upgrade to a supported fixed PAN-OS version." } ], "source": { "defect": [ "PAN-215223" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2025-06-11T16:00:00.000Z", "value": "Initial Publication" } ], "title": "PAN-OS: Authenticated Admin Command Injection Vulnerability in the Management Web Interface", "workarounds": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003e\u003cb\u003eRecommended mitigation\u003c/b\u003e\u2014The vast majority of firewalls already follow Palo Alto Networks and industry best practices. However, if you have not already, we strongly recommend that you secure access to your management interface according to our \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431\"\u003ecritical deployment guidelines\u003c/a\u003e. Specifically, you should restrict management interface access to only trusted internal IP addresses.\u003c/p\u003e\u003cp\u003eReview more information about how to secure management access to your Palo Alto Networks firewalls in these documents:\u003c/p\u003e\u003cul\u003e\u003cli\u003e\u003cp\u003ePalo Alto Networks LIVEcommunity article: \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431\"\u003ehttps://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431\u003c/a\u003e\u003c/p\u003e\u003c/li\u003e\u003c/ul\u003e\u003cul\u003e\u003cli\u003e\u003cp\u003ePalo Alto Networks official and detailed technical documentation: \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://docs.paloaltonetworks.com/best-practices/10-1/administrative-access-best-practices/administrative-access-best-practices/deploy-administrative-access-best-practices\"\u003ehttps://docs.paloaltonetworks.com/best-practices/10-1/administrative-access-best-practices/administrative-access-best-practices/deploy-administrative-access-best-practices\u003c/a\u003e\u003c/p\u003e\u003c/li\u003e\u003c/ul\u003e" } ], "value": "Recommended mitigation\u2014The vast majority of firewalls already follow Palo Alto Networks and industry best practices. However, if you have not already, we strongly recommend that you secure access to your management interface according to our https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 \n\n\n\n\n * Palo Alto Networks official and detailed technical documentation: https://docs.paloaltonetworks.com/best-practices/10-1/administrative-access-best-practices/administrative-access-best-practices/deploy-administrative-access-best-practices" } ], "x_affectedList": [ "PAN-OS 11.0.2-h5", "PAN-OS 11.0.2-h4", "PAN-OS 11.0.2-h3", "PAN-OS 11.0.2-h2", "PAN-OS 11.0.2-h1", "PAN-OS 11.0.2", "PAN-OS 11.0.1-h5", "PAN-OS 11.0.1-h4", "PAN-OS 11.0.1-h3", "PAN-OS 11.0.1-h2", "PAN-OS 11.0.1-h1", "PAN-OS 11.0.1", "PAN-OS 11.0.0-h4", "PAN-OS 11.0.0-h3", "PAN-OS 11.0.0-h2", "PAN-OS 11.0.0-h1", "PAN-OS 11.0.0", "PAN-OS 10.2.7-h24", "PAN-OS 10.2.7-h23", "PAN-OS 10.2.7-h22", "PAN-OS 10.2.7-h21", "PAN-OS 10.2.7-h20", "PAN-OS 10.2.7-h19", "PAN-OS 10.2.7-h18", "PAN-OS 10.2.7-h17", "PAN-OS 10.2.7-h16", "PAN-OS 10.2.7-h15", "PAN-OS 10.2.7-h14", "PAN-OS 10.2.7-h13", "PAN-OS 10.2.7-h12", "PAN-OS 10.2.7-h11", "PAN-OS 10.2.7-h10", "PAN-OS 10.2.7-h9", "PAN-OS 10.2.7-h8", "PAN-OS 10.2.7-h7", "PAN-OS 10.2.7-h6", "PAN-OS 10.2.7-h5", "PAN-OS 10.2.7-h4", "PAN-OS 10.2.7-h3", "PAN-OS 10.2.7-h2", "PAN-OS 10.2.7-h1", "PAN-OS 10.2.7", "PAN-OS 10.2.6-h6", "PAN-OS 10.2.6-h5", "PAN-OS 10.2.6-h4", "PAN-OS 10.2.6-h3", "PAN-OS 10.2.6-h2", "PAN-OS 10.2.6-h1", "PAN-OS 10.2.6", "PAN-OS 10.2.5-h9", "PAN-OS 10.2.5-h8", "PAN-OS 10.2.5-h7", "PAN-OS 10.2.5-h6", "PAN-OS 10.2.5-h5", "PAN-OS 10.2.5-h4", "PAN-OS 10.2.5-h3", "PAN-OS 10.2.5-h2", "PAN-OS 10.2.5-h1", "PAN-OS 10.2.5", "PAN-OS 10.2.4-h32", "PAN-OS 10.2.4-h31", "PAN-OS 10.2.4-h30", "PAN-OS 10.2.4-h29", "PAN-OS 10.2.4-h28", "PAN-OS 10.2.4-h27", "PAN-OS 10.2.4-h26", "PAN-OS 10.2.4-h25", "PAN-OS 10.2.4-h24", "PAN-OS 10.2.4-h23", "PAN-OS 10.2.4-h22", "PAN-OS 10.2.4-h21", "PAN-OS 10.2.4-h20", "PAN-OS 10.2.4-h19", "PAN-OS 10.2.4-h18", "PAN-OS 10.2.4-h17", "PAN-OS 10.2.4-h16", "PAN-OS 10.2.4-h15", "PAN-OS 10.2.4-h14", "PAN-OS 10.2.4-h13", "PAN-OS 10.2.4-h12", "PAN-OS 10.2.4-h11", "PAN-OS 10.2.4-h10", "PAN-OS 10.2.4-h9", "PAN-OS 10.2.4-h8", "PAN-OS 10.2.4-h7", "PAN-OS 10.2.4-h6", "PAN-OS 10.2.4-h5", "PAN-OS 10.2.4-h4", "PAN-OS 10.2.4-h3", "PAN-OS 10.2.4-h2", "PAN-OS 10.2.4-h1", "PAN-OS 10.2.4", "PAN-OS 10.2.3-h14", "PAN-OS 10.2.3-h13", "PAN-OS 10.2.3-h12", "PAN-OS 10.2.3-h11", "PAN-OS 10.2.3-h10", "PAN-OS 10.2.3-h9", "PAN-OS 10.2.3-h8", "PAN-OS 10.2.3-h7", "PAN-OS 10.2.3-h6", "PAN-OS 10.2.3-h5", "PAN-OS 10.2.3-h4", "PAN-OS 10.2.3-h3", "PAN-OS 10.2.3-h2", "PAN-OS 10.2.3-h1", "PAN-OS 10.2.3", "PAN-OS 10.2.2-h6", "PAN-OS 10.2.2-h5", "PAN-OS 10.2.2-h4", "PAN-OS 10.2.2-h3", "PAN-OS 10.2.2-h2", "PAN-OS 10.2.2-h1", "PAN-OS 10.2.2", "PAN-OS 10.2.1-h3", "PAN-OS 10.2.1-h2", "PAN-OS 10.2.1-h1", "PAN-OS 10.2.1", "PAN-OS 10.2.0-h4", "PAN-OS 10.2.0-h3", "PAN-OS 10.2.0-h2", "PAN-OS 10.2.0-h1", "PAN-OS 10.2.0", "PAN-OS 10.1.14-h14", "PAN-OS 10.1.14-h13", "PAN-OS 10.1.14-h11", "PAN-OS 10.1.14-h10", "PAN-OS 10.1.14-h9", "PAN-OS 10.1.14-h8", "PAN-OS 10.1.14-h7", "PAN-OS 10.1.14-h6", "PAN-OS 10.1.14-h5", "PAN-OS 10.1.14-h4", "PAN-OS 10.1.14-h3", "PAN-OS 10.1.14-h2", "PAN-OS 10.1.14-h1", "PAN-OS 10.1.14", "PAN-OS 10.1.13-h5", "PAN-OS 10.1.13-h4", "PAN-OS 10.1.13-h3", "PAN-OS 10.1.13-h2", "PAN-OS 10.1.13-h1", "PAN-OS 10.1.13", "PAN-OS 10.1.12-h3", "PAN-OS 10.1.12-h2", "PAN-OS 10.1.12-h1", "PAN-OS 10.1.12", "PAN-OS 10.1.11-h10", "PAN-OS 10.1.11-h9", "PAN-OS 10.1.11-h8", "PAN-OS 10.1.11-h7", "PAN-OS 10.1.11-h6", "PAN-OS 10.1.11-h5", "PAN-OS 10.1.11-h4", "PAN-OS 10.1.11-h3", "PAN-OS 10.1.11-h2", "PAN-OS 10.1.11-h1", "PAN-OS 10.1.11", "PAN-OS 10.1.10-h9", "PAN-OS 10.1.10-h8", "PAN-OS 10.1.10-h7", "PAN-OS 10.1.10-h6", "PAN-OS 10.1.10-h5", "PAN-OS 10.1.10-h4", "PAN-OS 10.1.10-h3", "PAN-OS 10.1.10-h2", "PAN-OS 10.1.10-h1", "PAN-OS 10.1.10", "PAN-OS 10.1.9-h14", "PAN-OS 10.1.9-h13", "PAN-OS 10.1.9-h12", "PAN-OS 10.1.9-h11", "PAN-OS 10.1.9-h10", "PAN-OS 10.1.9-h9", "PAN-OS 10.1.9-h8", "PAN-OS 10.1.9-h7", "PAN-OS 10.1.9-h6", "PAN-OS 10.1.9-h5", "PAN-OS 10.1.9-h4", "PAN-OS 10.1.9-h3", "PAN-OS 10.1.9-h2", "PAN-OS 10.1.9-h1", "PAN-OS 10.1.9", "PAN-OS 10.1.8-h8", "PAN-OS 10.1.8-h7", "PAN-OS 10.1.8-h6", "PAN-OS 10.1.8-h5", "PAN-OS 10.1.8-h4", "PAN-OS 10.1.8-h3", "PAN-OS 10.1.8-h2", "PAN-OS 10.1.8-h1", "PAN-OS 10.1.8", "PAN-OS 10.1.7-h1", "PAN-OS 10.1.7", "PAN-OS 10.1.6-h9", "PAN-OS 10.1.6-h8", "PAN-OS 10.1.6-h7", "PAN-OS 10.1.6-h6", "PAN-OS 10.1.6-h5", "PAN-OS 10.1.6-h4", "PAN-OS 10.1.6-h3", "PAN-OS 10.1.6-h2", "PAN-OS 10.1.6-h1", "PAN-OS 10.1.6", "PAN-OS 10.1.5-h4", "PAN-OS 10.1.5-h3", "PAN-OS 10.1.5-h2", "PAN-OS 10.1.5-h1", "PAN-OS 10.1.5", "PAN-OS 10.1.4-h6", "PAN-OS 10.1.4-h5", "PAN-OS 10.1.4-h4", "PAN-OS 10.1.4-h3", "PAN-OS 10.1.4-h2", "PAN-OS 10.1.4-h1", "PAN-OS 10.1.4", "PAN-OS 10.1.3-h4", "PAN-OS 10.1.3-h3", "PAN-OS 10.1.3-h2", "PAN-OS 10.1.3-h1", "PAN-OS 10.1.3", "PAN-OS 10.1.2", "PAN-OS 10.1.1", "PAN-OS 10.1.0" ], "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "assignerShortName": "palo_alto", "cveId": "CVE-2025-4231", "datePublished": "2025-06-12T23:27:31.432Z", "dateReserved": "2025-05-02T19:10:44.240Z", "dateUpdated": "2025-06-13T13:32:58.253Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-4230 (GCVE-0-2025-4230)
Vulnerability from cvelistv5
Published
2025-06-12 23:30
Modified
2025-06-13 13:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Summary
A command injection vulnerability in Palo Alto Networks PAN-OS® software enables an authenticated administrator to bypass system restrictions and run arbitrary commands as a root user. To be able to exploit this issue, the user must have access to the PAN-OS CLI.
The security risk posed by this issue is significantly minimized when CLI access is restricted to a limited group of administrators.
Cloud NGFW and Prisma® Access are not affected by this vulnerability.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Palo Alto Networks | Cloud NGFW |
Patch: All < 6.3.3 |
|||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-4230", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-06-13T03:55:21.285455Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-13T13:32:41.271Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Cloud NGFW", "vendor": "Palo Alto Networks", "versions": [ { "changes": [ { "at": "6.3.3", "status": "unaffected" } ], "lessThan": "6.3.3", "status": "unaffected", "version": "All", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:palo_alto_networks:pan-os:11.2.5:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:11.2.3:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:11.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:11.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:11.2.0:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:11.1.9:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:11.1.8:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:11.1.5:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:11.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:11.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:11.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:11.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.2.13:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.2.12:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.2.11:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.2.10:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.2.9:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.2.8:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.2.6:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.2.5:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.2.4:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.2.3:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.2.0:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:h14:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:h13:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:h11:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:h10:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:h9:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:h8:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:h7:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:h6:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:h5:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:h4:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:h3:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:h2:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:h1:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:-:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.1.13:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.1.12:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.1.11:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.1.10:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.1.9:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.1.8:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.1.7:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.1.6:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.1.5:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.1.4:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:palo_alto_networks:pan-os:10.1.0:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "PAN-OS", "vendor": "Palo Alto Networks", "versions": [ { "changes": [ { "at": "11.2.6", "status": "unaffected" } ], "lessThan": "11.2.6", "status": "affected", "version": "11.2.0", "versionType": "custom" }, { "changes": [ { "at": "11.1.10", "status": "unaffected" } ], "lessThan": "11.1.10", "status": "affected", "version": "11.1.0", "versionType": "custom" }, { "changes": [ { "at": "10.2.14", "status": "unaffected" } ], "lessThan": "10.2.14", "status": "affected", "version": "10.2.0", "versionType": "custom" }, { "changes": [ { "at": "10.1.14-h15", "status": "unaffected" } ], "lessThan": "10.1.14-h15", "status": "affected", "version": "10.1.0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "Prisma Access", "vendor": "Palo Alto Networks", "versions": [ { "status": "unaffected", "version": "All", "versionType": "custom" } ] } ], "configurations": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "No special configuration is required to be affected by this issue." } ], "value": "No special configuration is required to be affected by this issue." } ], "credits": [ { "lang": "en", "type": "finder", "value": "Visa Inc." } ], "datePublic": "2025-06-11T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eA command injection vulnerability in Palo Alto Networks PAN-OS\u00ae software enables an authenticated administrator to bypass system restrictions and run arbitrary commands as a root user. To be able to exploit this issue, the user must have access to the PAN-OS CLI.\u003c/p\u003eThe security risk posed by this issue is significantly minimized when CLI access is restricted to a limited group of administrators. \u003cb\u003e\u003cbr\u003e\u003cbr\u003e\u003c/b\u003eCloud NGFW and Prisma\u00ae Access are not affected by this vulnerability." } ], "value": "A command injection vulnerability in Palo Alto Networks PAN-OS\u00ae software enables an authenticated administrator to bypass system restrictions and run arbitrary commands as a root user. To be able to exploit this issue, the user must have access to the PAN-OS CLI.\n\nThe security risk posed by this issue is significantly minimized when CLI access is restricted to a limited group of administrators. \n\nCloud NGFW and Prisma\u00ae Access are not affected by this vulnerability." } ], "exploits": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue." } ], "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue." } ], "impacts": [ { "capecId": "CAPEC-248", "descriptions": [ { "lang": "en", "value": "CAPEC-248 Command Injection" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "USER", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "LOCAL", "baseScore": 8.4, "baseSeverity": "HIGH", "privilegesRequired": "HIGH", "providerUrgency": "AMBER", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "DIFFUSE", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/R:U/V:D/U:Amber", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "HIGH", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-12T23:30:15.781Z", "orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "shortName": "palo_alto" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2025-4230" } ], "solutions": [ { "lang": "eng", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003ctable\u003e\u003cthead\u003e\u003ctr\u003e\u003cth\u003eVersion\u003cbr\u003e\u003c/th\u003e\u003cth\u003eMinor Version\u003cbr\u003e\u003c/th\u003e\u003cth\u003eSuggested Solution\u003cbr\u003e\u003c/th\u003e\u003c/tr\u003e\u003c/thead\u003e\u003ctbody\u003e\u003ctr\u003e\u003ctd\u003eCloud NGFW All\u003cbr\u003e\u003c/td\u003e\u003ctd\u003e\u003c/td\u003e\u003ctd\u003eNo action needed.\u003c/td\u003e\u003c/tr\u003e\u003ctr\u003e\n \u003ctd\u003ePAN-OS 11.2\u003cbr\u003e\u003c/td\u003e\n \u003ctd\u003e11.2.0 through 11.2.5\u003c/td\u003e\n \u003ctd\u003eUpgrade to 11.2.6 or later.\u003c/td\u003e\n \u003c/tr\u003e\u003ctr\u003e\n \u003ctd\u003ePAN-OS 11.1\u003cbr\u003e\u003c/td\u003e\n \u003ctd\u003e11.1.0 through 11.1.9\u003c/td\u003e\n \u003ctd\u003eUpgrade to 11.1.10 or later.\u003c/td\u003e\n \u003c/tr\u003e\u003ctr\u003e\n \u003ctd\u003ePAN-OS 10.2\u003cbr\u003e\u003c/td\u003e\n \u003ctd\u003e10.2.0 through 10.2.13\u003c/td\u003e\n \u003ctd\u003eUpgrade to 10.2.14 or later.\u003c/td\u003e\n \u003c/tr\u003e\u003ctr\u003e\n \u003ctd\u003ePAN-OS 10.1\u003cbr\u003e\u003c/td\u003e\n \u003ctd\u003e10.1.0 through 10.1.14\u003c/td\u003e\n \u003ctd\u003eUpgrade to 10.1.14-h15 or later.\u003c/td\u003e\n \u003c/tr\u003e\u003ctr\u003e\u003ctd\u003eAll older\u003cbr\u003eunsupported\u003cbr\u003ePAN-OS versions\u003c/td\u003e\u003ctd\u003e\u0026nbsp;\u003c/td\u003e\u003ctd\u003eUpgrade to a supported fixed version.\u003c/td\u003e\u003c/tr\u003e\u003ctr\u003e\u003ctd\u003ePrisma Access All\u003cbr\u003e\u003c/td\u003e\u003ctd\u003e\u003c/td\u003e\u003ctd\u003eNo action needed.\u003c/td\u003e\u003c/tr\u003e\u003c/tbody\u003e\u003c/table\u003e" } ], "value": "Version\nMinor Version\nSuggested Solution\nCloud NGFW All\nNo action needed.\n PAN-OS 11.2\n\n 11.2.0 through 11.2.5\n Upgrade to 11.2.6 or later.\n \n PAN-OS 11.1\n\n 11.1.0 through 11.1.9\n Upgrade to 11.1.10 or later.\n \n PAN-OS 10.2\n\n 10.2.0 through 10.2.13\n Upgrade to 10.2.14 or later.\n \n PAN-OS 10.1\n\n 10.1.0 through 10.1.14\n Upgrade to 10.1.14-h15 or later.\n All older\nunsupported\nPAN-OS versions\u00a0Upgrade to a supported fixed version.Prisma Access All\nNo action needed." } ], "source": { "defect": [ "PAN-271215" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2025-06-11T16:00:00.000Z", "value": "Initial Publication" } ], "title": "PAN-OS: Authenticated Admin Command Injection Vulnerability Through CLI", "workarounds": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "No workaround or mitigation is available." } ], "value": "No workaround or mitigation is available." } ], "x_affectedList": [ "PAN-OS 11.2.5", "PAN-OS 11.2.4-h8", "PAN-OS 11.2.4-h7", "PAN-OS 11.2.4-h6", "PAN-OS 11.2.4-h5", "PAN-OS 11.2.4-h4", "PAN-OS 11.2.4-h3", "PAN-OS 11.2.4-h2", "PAN-OS 11.2.4-h1", "PAN-OS 11.2.4", "PAN-OS 11.2.3-h5", "PAN-OS 11.2.3-h4", "PAN-OS 11.2.3-h3", "PAN-OS 11.2.3-h2", "PAN-OS 11.2.3-h1", "PAN-OS 11.2.3", "PAN-OS 11.2.2-h2", "PAN-OS 11.2.2-h1", "PAN-OS 11.2.1-h1", "PAN-OS 11.2.1", "PAN-OS 11.2.0-h1", "PAN-OS 11.2.0", "PAN-OS 11.1.9", "PAN-OS 11.1.8", "PAN-OS 11.1.6-h10", "PAN-OS 11.1.6-h7", "PAN-OS 11.1.6-h6", "PAN-OS 11.1.6-h4", "PAN-OS 11.1.6-h3", "PAN-OS 11.1.6-h2", "PAN-OS 11.1.6-h1", "PAN-OS 11.1.6", "PAN-OS 11.1.5-h1", "PAN-OS 11.1.5", "PAN-OS 11.1.4-h18", "PAN-OS 11.1.4-h17", "PAN-OS 11.1.4-h15", "PAN-OS 11.1.4-h13", "PAN-OS 11.1.4-h12", "PAN-OS 11.1.4-h11", "PAN-OS 11.1.4-h10", "PAN-OS 11.1.4-h9", "PAN-OS 11.1.4-h8", "PAN-OS 11.1.4-h7", "PAN-OS 11.1.4-h6", "PAN-OS 11.1.4-h5", "PAN-OS 11.1.4-h4", "PAN-OS 11.1.4-h3", "PAN-OS 11.1.4-h2", "PAN-OS 11.1.4-h1", "PAN-OS 11.1.4", "PAN-OS 11.1.3-h13", "PAN-OS 11.1.3-h12", "PAN-OS 11.1.3-h11", "PAN-OS 11.1.3-h10", "PAN-OS 11.1.3-h9", "PAN-OS 11.1.3-h8", "PAN-OS 11.1.3-h7", "PAN-OS 11.1.3-h6", "PAN-OS 11.1.3-h5", "PAN-OS 11.1.3-h4", "PAN-OS 11.1.3-h3", "PAN-OS 11.1.3-h2", "PAN-OS 11.1.3-h1", "PAN-OS 11.1.3", "PAN-OS 11.1.2-h18", "PAN-OS 11.1.2-h17", "PAN-OS 11.1.2-h16", "PAN-OS 11.1.2-h15", "PAN-OS 11.1.2-h14", "PAN-OS 11.1.2-h13", "PAN-OS 11.1.2-h12", "PAN-OS 11.1.2-h11", "PAN-OS 11.1.2-h10", "PAN-OS 11.1.2-h9", "PAN-OS 11.1.2-h8", "PAN-OS 11.1.2-h7", "PAN-OS 11.1.2-h6", "PAN-OS 11.1.2-h5", "PAN-OS 11.1.2-h4", "PAN-OS 11.1.2-h3", "PAN-OS 11.1.2-h2", "PAN-OS 11.1.2-h1", "PAN-OS 11.1.2", "PAN-OS 11.1.1-h2", "PAN-OS 11.1.1-h1", "PAN-OS 11.1.1", "PAN-OS 11.1.0-h4", "PAN-OS 11.1.0-h3", "PAN-OS 11.1.0-h2", "PAN-OS 11.1.0-h1", "PAN-OS 11.1.0", "PAN-OS 10.2.11-h12", "PAN-OS 10.2.11-h11", "PAN-OS 10.2.11-h10", "PAN-OS 10.2.11-h9", "PAN-OS 10.2.11-h8", "PAN-OS 10.2.11-h7", "PAN-OS 10.2.11-h6", "PAN-OS 10.2.11-h5", "PAN-OS 10.2.11-h4", "PAN-OS 10.2.11-h3", "PAN-OS 10.2.11-h2", "PAN-OS 10.2.11-h1", "PAN-OS 10.2.11", "PAN-OS 10.2.10-h21", "PAN-OS 10.2.10-h18", "PAN-OS 10.2.10-h17", "PAN-OS 10.2.10-h14", "PAN-OS 10.2.10-h13", "PAN-OS 10.2.10-h12", "PAN-OS 10.2.10-h11", "PAN-OS 10.2.10-h10", "PAN-OS 10.2.10-h9", "PAN-OS 10.2.10-h8", "PAN-OS 10.2.10-h7", "PAN-OS 10.2.10-h6", "PAN-OS 10.2.10-h5", "PAN-OS 10.2.10-h4", "PAN-OS 10.2.10-h3", "PAN-OS 10.2.10-h2", "PAN-OS 10.2.10-h1", "PAN-OS 10.2.10", "PAN-OS 10.2.9-h21", "PAN-OS 10.2.9-h20", "PAN-OS 10.2.9-h19", "PAN-OS 10.2.9-h18", "PAN-OS 10.2.9-h17", "PAN-OS 10.2.9-h16", "PAN-OS 10.2.9-h15", "PAN-OS 10.2.9-h14", "PAN-OS 10.2.9-h13", "PAN-OS 10.2.9-h12", "PAN-OS 10.2.9-h11", "PAN-OS 10.2.9-h10", "PAN-OS 10.2.9-h9", "PAN-OS 10.2.9-h8", "PAN-OS 10.2.9-h7", "PAN-OS 10.2.9-h6", "PAN-OS 10.2.9-h5", "PAN-OS 10.2.9-h4", "PAN-OS 10.2.9-h3", "PAN-OS 10.2.9-h2", "PAN-OS 10.2.9-h1", "PAN-OS 10.2.9", "PAN-OS 10.2.8-h21", "PAN-OS 10.2.8-h20", "PAN-OS 10.2.8-h19", "PAN-OS 10.2.8-h18", "PAN-OS 10.2.8-h17", "PAN-OS 10.2.8-h16", "PAN-OS 10.2.8-h15", "PAN-OS 10.2.8-h14", "PAN-OS 10.2.8-h13", "PAN-OS 10.2.8-h12", "PAN-OS 10.2.8-h11", "PAN-OS 10.2.8-h10", "PAN-OS 10.2.8-h9", "PAN-OS 10.2.8-h8", "PAN-OS 10.2.8-h7", "PAN-OS 10.2.8-h6", "PAN-OS 10.2.8-h5", "PAN-OS 10.2.8-h4", "PAN-OS 10.2.8-h3", "PAN-OS 10.2.8-h2", "PAN-OS 10.2.8-h1", "PAN-OS 10.2.8", "PAN-OS 10.2.7-h24", "PAN-OS 10.2.7-h23", "PAN-OS 10.2.7-h22", "PAN-OS 10.2.7-h21", "PAN-OS 10.2.7-h20", "PAN-OS 10.2.7-h19", "PAN-OS 10.2.7-h18", "PAN-OS 10.2.7-h17", "PAN-OS 10.2.7-h16", "PAN-OS 10.2.7-h15", "PAN-OS 10.2.7-h14", "PAN-OS 10.2.7-h13", "PAN-OS 10.2.7-h12", "PAN-OS 10.2.7-h11", "PAN-OS 10.2.7-h10", "PAN-OS 10.2.7-h9", "PAN-OS 10.2.7-h8", "PAN-OS 10.2.7-h7", "PAN-OS 10.2.7-h6", "PAN-OS 10.2.7-h5", "PAN-OS 10.2.7-h4", "PAN-OS 10.2.7-h3", "PAN-OS 10.2.7-h2", "PAN-OS 10.2.7-h1", "PAN-OS 10.2.7", "PAN-OS 10.2.6-h6", "PAN-OS 10.2.6-h5", "PAN-OS 10.2.6-h4", "PAN-OS 10.2.6-h3", "PAN-OS 10.2.6-h2", "PAN-OS 10.2.6-h1", "PAN-OS 10.2.6", "PAN-OS 10.2.5-h9", "PAN-OS 10.2.5-h8", "PAN-OS 10.2.5-h7", "PAN-OS 10.2.5-h6", "PAN-OS 10.2.5-h5", "PAN-OS 10.2.5-h4", "PAN-OS 10.2.5-h3", "PAN-OS 10.2.5-h2", "PAN-OS 10.2.5-h1", "PAN-OS 10.2.5", "PAN-OS 10.2.4-h32", "PAN-OS 10.2.4-h31", "PAN-OS 10.2.4-h30", "PAN-OS 10.2.4-h29", "PAN-OS 10.2.4-h28", "PAN-OS 10.2.4-h27", "PAN-OS 10.2.4-h26", "PAN-OS 10.2.4-h25", "PAN-OS 10.2.4-h24", "PAN-OS 10.2.4-h23", "PAN-OS 10.2.4-h22", "PAN-OS 10.2.4-h21", "PAN-OS 10.2.4-h20", "PAN-OS 10.2.4-h19", "PAN-OS 10.2.4-h18", "PAN-OS 10.2.4-h17", "PAN-OS 10.2.4-h16", "PAN-OS 10.2.4-h15", "PAN-OS 10.2.4-h14", "PAN-OS 10.2.4-h13", "PAN-OS 10.2.4-h12", "PAN-OS 10.2.4-h11", "PAN-OS 10.2.4-h10", "PAN-OS 10.2.4-h9", "PAN-OS 10.2.4-h8", "PAN-OS 10.2.4-h7", "PAN-OS 10.2.4-h6", "PAN-OS 10.2.4-h5", "PAN-OS 10.2.4-h4", "PAN-OS 10.2.4-h3", "PAN-OS 10.2.4-h2", "PAN-OS 10.2.4-h1", "PAN-OS 10.2.4", "PAN-OS 10.2.3-h14", "PAN-OS 10.2.3-h13", "PAN-OS 10.2.3-h12", "PAN-OS 10.2.3-h11", "PAN-OS 10.2.3-h10", "PAN-OS 10.2.3-h9", "PAN-OS 10.2.3-h8", "PAN-OS 10.2.3-h7", "PAN-OS 10.2.3-h6", "PAN-OS 10.2.3-h5", "PAN-OS 10.2.3-h4", "PAN-OS 10.2.3-h3", "PAN-OS 10.2.3-h2", "PAN-OS 10.2.3-h1", "PAN-OS 10.2.3", "PAN-OS 10.2.2-h6", "PAN-OS 10.2.2-h5", "PAN-OS 10.2.2-h4", "PAN-OS 10.2.2-h3", "PAN-OS 10.2.2-h2", "PAN-OS 10.2.2-h1", "PAN-OS 10.2.2", "PAN-OS 10.2.1-h3", "PAN-OS 10.2.1-h2", "PAN-OS 10.2.1-h1", "PAN-OS 10.2.1", "PAN-OS 10.2.0-h4", "PAN-OS 10.2.0-h3", "PAN-OS 10.2.0-h2", "PAN-OS 10.2.0-h1", "PAN-OS 10.2.0", "PAN-OS 10.1.14-h14", "PAN-OS 10.1.14-h13", "PAN-OS 10.1.14-h11", "PAN-OS 10.1.14-h10", "PAN-OS 10.1.14-h9", "PAN-OS 10.1.14-h8", "PAN-OS 10.1.14-h7", "PAN-OS 10.1.14-h6", "PAN-OS 10.1.14-h5", "PAN-OS 10.1.14-h4", "PAN-OS 10.1.14-h3", "PAN-OS 10.1.14-h2", "PAN-OS 10.1.14-h1", "PAN-OS 10.1.14", "PAN-OS 10.1.13-h5", "PAN-OS 10.1.13-h4", "PAN-OS 10.1.13-h3", "PAN-OS 10.1.13-h2", "PAN-OS 10.1.13-h1", "PAN-OS 10.1.13", "PAN-OS 10.1.12-h3", "PAN-OS 10.1.12-h2", "PAN-OS 10.1.12-h1", "PAN-OS 10.1.12", "PAN-OS 10.1.11-h10", "PAN-OS 10.1.11-h9", "PAN-OS 10.1.11-h8", "PAN-OS 10.1.11-h7", "PAN-OS 10.1.11-h6", "PAN-OS 10.1.11-h5", "PAN-OS 10.1.11-h4", "PAN-OS 10.1.11-h3", "PAN-OS 10.1.11-h2", "PAN-OS 10.1.11-h1", "PAN-OS 10.1.11", "PAN-OS 10.1.10-h9", "PAN-OS 10.1.10-h8", "PAN-OS 10.1.10-h7", "PAN-OS 10.1.10-h6", "PAN-OS 10.1.10-h5", "PAN-OS 10.1.10-h4", "PAN-OS 10.1.10-h3", "PAN-OS 10.1.10-h2", "PAN-OS 10.1.10-h1", "PAN-OS 10.1.10", "PAN-OS 10.1.9-h14", "PAN-OS 10.1.9-h13", "PAN-OS 10.1.9-h12", "PAN-OS 10.1.9-h11", "PAN-OS 10.1.9-h10", "PAN-OS 10.1.9-h9", "PAN-OS 10.1.9-h8", "PAN-OS 10.1.9-h7", "PAN-OS 10.1.9-h6", "PAN-OS 10.1.9-h5", "PAN-OS 10.1.9-h4", "PAN-OS 10.1.9-h3", "PAN-OS 10.1.9-h2", "PAN-OS 10.1.9-h1", "PAN-OS 10.1.9", "PAN-OS 10.1.8-h8", "PAN-OS 10.1.8-h7", "PAN-OS 10.1.8-h6", "PAN-OS 10.1.8-h5", "PAN-OS 10.1.8-h4", "PAN-OS 10.1.8-h3", "PAN-OS 10.1.8-h2", "PAN-OS 10.1.8-h1", "PAN-OS 10.1.8", "PAN-OS 10.1.7-h1", "PAN-OS 10.1.7", "PAN-OS 10.1.6-h9", "PAN-OS 10.1.6-h8", "PAN-OS 10.1.6-h7", "PAN-OS 10.1.6-h6", "PAN-OS 10.1.6-h5", "PAN-OS 10.1.6-h4", "PAN-OS 10.1.6-h3", "PAN-OS 10.1.6-h2", "PAN-OS 10.1.6-h1", "PAN-OS 10.1.6", "PAN-OS 10.1.5-h4", "PAN-OS 10.1.5-h3", "PAN-OS 10.1.5-h2", "PAN-OS 10.1.5-h1", "PAN-OS 10.1.5", "PAN-OS 10.1.4-h6", "PAN-OS 10.1.4-h5", "PAN-OS 10.1.4-h4", "PAN-OS 10.1.4-h3", "PAN-OS 10.1.4-h2", "PAN-OS 10.1.4-h1", "PAN-OS 10.1.4", "PAN-OS 10.1.3-h4", "PAN-OS 10.1.3-h3", "PAN-OS 10.1.3-h2", "PAN-OS 10.1.3-h1", "PAN-OS 10.1.3", "PAN-OS 10.1.2", "PAN-OS 10.1.1", "PAN-OS 10.1.0" ], "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "assignerShortName": "palo_alto", "cveId": "CVE-2025-4230", "datePublished": "2025-06-12T23:30:15.781Z", "dateReserved": "2025-05-02T19:10:43.398Z", "dateUpdated": "2025-06-13T13:32:41.271Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…