Palo Alto Products Multiple Vulnerabilities
RISK: Medium Risk
TYPE: Security software and application - Security Software & Appliance
Multiple vulnerabilities were identified in Palo Alto Products. A remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, remote code execution, sensitive information disclosure, data manipulation and security restriction bypass on the targeted system.
Note:
Proof Of Concept exploit code is publicly available for CVE-2025-0124. An authenticated file deletion vulnerability in the Palo Alto Networks PAN-OS software enables an authenticated attacker with network access to the management web interface to delete certain files as the “nobody” user; this includes limited logs and configuration files but does not include system files. Hence, the risk level is rated as Medium Risk.
Impact
- Remote Code Execution
- Denial of Service
- Security Restriction Bypass
- Information Disclosure
- Data Manipulation
System / Technologies affected
- PAN-OS 10.1 versions earlier than 10.1.14-h13
- PAN-OS 10.1 versions earlier than 10.1.14-h13 on VM-Series
- PAN-OS 10.2 versions earlier than 10.2.15
- PAN-OS 10.2 versions earlier than 10.2.9 on VM-Series
- PAN-OS 11.0 versions earlier than 11.0.4 on VM-Series
- PAN-OS 11.0 versions earlier than 11.0.6
- PAN-OS 11.1 versions earlier than 11.1.8
- PAN-OS 11.2 versions earlier than 11.2.6
- Prisma Access versions earlier than 10.2.10-h17 on PAN-OS
- Prisma Access versions earlier than 11.2.4-h5 on PAN-OS
For CVE-2025-0124
- Cloud NGFW All versions
- PAN-OS 11.2 versions earlier than 11.2.1
- PAN-OS 11.1 versions earlier than 11.1.5
- PAN-OS 11.0 versions earlier than 11.0.6
- PAN-OS 10.2 versions earlier than 10.2.10
- PAN-OS 10.1 versions earlier than 10.1.14-h11
Solutions
Before installation of the software, please visit the vendor web-site for more details.
Apply fixes issued by the vendor:
- https://securityadvisories.paloaltonetworks.com/CVE-2025-0123
- https://securityadvisories.paloaltonetworks.com/CVE-2025-0124
- https://securityadvisories.paloaltonetworks.com/CVE-2025-0125
- https://securityadvisories.paloaltonetworks.com/CVE-2025-0126
- https://securityadvisories.paloaltonetworks.com/CVE-2025-0127
- https://securityadvisories.paloaltonetworks.com/CVE-2025-0128
Vulnerability Identifier
Source
Related Link
- https://security.paloaltonetworks.com/
- https://securityadvisories.paloaltonetworks.com/CVE-2025-0123
- https://securityadvisories.paloaltonetworks.com/CVE-2025-0124
- https://securityadvisories.paloaltonetworks.com/CVE-2025-0125
- https://securityadvisories.paloaltonetworks.com/CVE-2025-0126
- https://securityadvisories.paloaltonetworks.com/CVE-2025-0127
- https://securityadvisories.paloaltonetworks.com/CVE-2025-0128
沒有留言:
發佈留言