Cyber Posture

CVE-2025-0108

CriticalCISA KEVActive ExploitationPublic PoC

Published: 12 February 2025

Published
12 February 2025
Modified
04 November 2025
KEV Added
18 February 2025
Patch
CVSS Score 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
EPSS Score 0.9412 99.9th percentile
Risk Priority 95 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may access network configuration files to collect sensitive data about the device and the network.

Security Summary

CVE-2025-0108 is an authentication bypass vulnerability in the Palo Alto Networks PAN-OS software, affecting the management web interface. Published on 2025-02-12, it allows an unauthenticated attacker with network access to bypass authentication and invoke certain PHP scripts. While this does not enable remote code execution, it can negatively impact the integrity and confidentiality of PAN-OS. The vulnerability does not affect Cloud NGFW or Prisma Access software and is associated with CWE-306 (Missing Authentication for Critical Function), earning a CVSS v3.1 base score of 9.1 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).

An unauthenticated attacker who has network access to the exposed PAN-OS management web interface can exploit this vulnerability with low complexity and no privileges required. Successful exploitation enables the attacker to invoke specific PHP scripts, potentially compromising the confidentiality and integrity of the firewall configuration or data without disrupting availability.

Palo Alto Networks advisories recommend greatly reducing risk by restricting management web interface access to only trusted internal IP addresses, following their best practices deployment guidelines. A patch is available via the official security advisory at https://security.paloaltonetworks.com/CVE-2025-0108.

Notable context includes a public proof-of-concept exploit available on GitHub at https://github.com/iSee857/CVE-2025-0108-PoC, and reports indicating active exploitation in the wild, with Palo Alto Networks tagging the flaw as exploited and CISA researchers urging immediate patching.

Details

CWE(s)
CWE-306
KEV Date Added
18 February 2025

Affected Products

paloaltonetworks
pan-os
10.1.14, 10.2.10, 10.2.11, 10.2.12, 10.2.13 · 10.1.0 — 10.1.14 · 10.2.0 — 10.2.7 · 11.1.0 — 11.1.2

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1210 Exploitation of Remote Services Lateral Movement
Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network.
T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
T1602.002 Network Device Configuration Dump Collection
Adversaries may access network configuration files to collect sensitive data about the device and the network.
Why these techniques?

CVE-2025-0108 enables unauthenticated access to PAN-OS management web interface (T1190, T1210). Chained exploitation facilitates collection of local data including configuration files (T1005, T1602.002).

References