CVE-2025-0108 PAN-OS

CVE-2025-0108 PAN-OS: Authentication Bypass in the Management Web Interface

An authentication bypass in the Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to bypass the authentication otherwise required by the PAN-OS management web interface and invoke certain PHP scripts. While invoking these PHP scripts does not enable remote code execution, it can negatively impact integrity and confidentiality of PAN-OS.

CVE-2025-0108 PAN-OS: Authentication Bypass in the Management Web Interface

You can greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended best practices deployment guidelines.

This issue does not affect Cloud NGFW or Prisma Access software.

Affected Systems

Versions Affected Unaffected
Cloud NGFW None All
Pan-Os 11.2 < 11.2.4-h4 >= 11.2.4-h4
Pan-Os 11.1 < 11.1.2-h18
< 11.1.6-h1
>= 11.1.2-h18
>= 11.1.6-h1
Pan-Os 10.2 < 10.2.7-h24
< 10.2.8-h21
< 10.2.9-h21
< 10.2.10-h14
< 10.2.11-h12
< 10.2.12-h6
< 10.2.13-h3
>= 10.2.7-h24
>= 10.2.8-h21
>= 10.2.9-h21
>= 10.2.10-h14
>= 10.2.11-h12
>= 10.2.12-h6
>= 10.2.13-h3
Pan-Os 10.1 < 10.1.14-h9 >= 10.1.14-h9
Prisma Access None All

IoC’s

-

Recommended Solution(s)

Recommended mitigation—The vast majority of firewalls already follow Palo Alto Networks and industry best practices. However, if you have not already, we strongly recommend that you secure access to your management interface according to our best practices deployment guidelines. Specifically, you should restrict management interface access to only trusted internal IP addresses.

CVE / CWE

CVE-2025-0108

Related Website(s)

* Vulnerabilities with a CVSS 3.1 score between 7.0 and 8.9 are evaluated to be “high” whereas vulnerabilities with a CVSS 3.1 score between 9.0 and 10.0 are evaluated to be “critical”.