-0.4 C
New York
Saturday, February 22, 2025

Palo Alto Networks Patches Authentication Bypass Exploit in PAN-OS Software program


Feb 13, 2025Ravie LakshmananCommunity Safety / Vulnerability

Palo Alto Networks Patches Authentication Bypass Exploit in PAN-OS Software program

Palo Alto Networks has addressed a high-severity safety flaw in its PAN-OS software program that might lead to an authentication bypass.

The vulnerability, tracked as CVE-2025-0108, carries a CVSS rating of seven.8 out of 10.0. The rating, nonetheless, drops to five.1 if entry to the administration interface is restricted to a soar field.

“An authentication bypass within the Palo Alto Networks PAN-OS software program permits an unauthenticated attacker with community entry to the administration internet interface to bypass the authentication in any other case required by the PAN-OS administration internet interface and invoke sure PHP scripts,” Palo Alto Networks mentioned in an advisory.

“Whereas invoking these PHP scripts doesn’t allow distant code execution, it could possibly negatively impression the integrity and confidentiality of PAN-OS.”

The vulnerability impacts the next variations –

  • PAN-OS 11.2 < 11.2.4-h4 (Mounted in >= 11.2.4-h4)
  • PAN-OS 11.1 < 11.1.6-h1 (Mounted in >= 11.1.6-h1)
  • PAN-OS 11.0 (Improve to a supported fastened model because it has reached end-of-life standing on November 17, 2024)
  • PAN-OS 10.2 < 10.2.13-h3 (Mounted in >= 10.2.13-h3
  • PAN-OS 10.1 < 10.1.14-h9 (Mounted in >= 10.1.14-h9)

Searchlight Cyber/Assetnote safety researcher Adam Kues, who’s credited with discovering and reporting the flaw, mentioned the safety defect has to do with a discrepancy in how the interface’s Nginx and Apache parts deal with incoming requests, leading to a listing traversal assault.

Cybersecurity

Palo Alto Networks has additionally shipped updates to resolve two different flaws –

  • CVE-2025-0109 (CVSS rating: 5.5) – An unauthenticated file deletion vulnerability within the Palo Alto Networks PAN-OS administration internet interface that allows an attacker with community entry to the administration internet interface to delete sure recordsdata because the “no person” person, together with restricted logs and configuration recordsdata (Mounted in PAN-OS variations 11.2.4-h4, 11.1.6-h1, 10.2.13-h3, and 10.1.14-h9)
  • CVE-2025-0110 (CVSS rating: 7.3) – A command injection vulnerability within the Palo Alto Networks PAN-OS OpenConfig plugin that allows an authenticated administrator with the power to make gNMI requests to the PAN-OS administration internet interface to bypass system restrictions and run arbitrary instructions (Mounted in PAN-OS OpenConfig Plugin model 2.1.2)

To mitigate the danger posed by the vulnerability, it is extremely suggested to disable entry to the administration interface from the web or any untrusted community. Prospects who don’t use OpenConfig can both select to disable or uninstall the plugin from their situations.

Discovered this text fascinating? Observe us on Twitter and LinkedIn to learn extra unique content material we publish.



Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles