CVE detail
CVE-2025-0108: Palo Alto Networks PAN-OS Authentication Bypass Vulnerability
Source: CISA Known Exploited Vulnerabilities catalog · back to feed
Vendor / product
Palo Alto Networks · PAN-OS
- Date added (KEV)
- Feb 18, 2025
- CISA due date
- Mar 11, 2025
- Ransomware campaign use
- Unknown
Required action
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Vendor fix: Vendor advisory
Scorifya interpretation
AI-generatedA short, structured read of the record above — generated when this page first loads, then cached for a week.
Plain English
Technical detail
From CISA
Palo Alto Networks PAN-OS contains an authentication bypass vulnerability in its management web interface. This vulnerability allows an unauthenticated attacker with network access to the management web interface to bypass the authentication normally required and invoke certain PHP scripts.
https://security.paloaltonetworks.com/CVE-2025-0108 ; https://nvd.nist.gov/vuln/detail/CVE-2025-0108
References
- https://security.paloaltonetworks.com/CVE-2025-0108ExploitVendor Advisory
- https://github.com/iSee857/CVE-2025-0108-PoCExploitThird Party Advisory
- https://slcyber.io/blog/nginx-apache-path-confusion-to-auth-bypass-in-pan-os/ExploitPress/Media Coverage
- https://www.bleepingcomputer.com/news/security/palo-alto-networks-tags-new-firewall-bug-as-exploited-in-attacks/Press/Media CoverageThird Party Advisory
Other recent CVEs from Palo Alto Networks
- CVE-2026-0300PAN-OS — Palo Alto Networks PAN-OS Out-of-bounds Write Vulnerability
- CVE-2025-0111PAN-OS — Palo Alto Networks PAN-OS File Read Vulnerability
- CVE-2024-3393PAN-OS — Palo Alto Networks PAN-OS Malicious DNS Packet Vulnerability
- CVE-2024-0012PAN-OS — Palo Alto Networks PAN-OS Management Interface Authentication Bypass Vulnerability
- CVE-2024-9474PAN-OS — Palo Alto Networks PAN-OS Management Interface OS Command Injection Vulnerability
Check your domain's public posture
Scorifya doesn't test for specific CVEs, but if patching Palo Alto Networks changed your headers or TLS, a fresh hardening scan helps confirm nothing regressed externally.