Summary: A critical authentication bypass vulnerability in Palo Alto Networks’ PAN-OS, tracked as CVE-2025-0108, is being actively exploited by attackers, allowing unauthorized access to certain PHP scripts. Cybersecurity authorities, including CISA, urge organizations to apply patches immediately as exploitation attempts have surged across multiple countries. Users of affected PAN-OS versions should secure their devices promptly to mitigate risks associated with this vulnerability.
Affected: Palo Alto Networks PAN-OS
Keypoints :
- Attackers can bypass authentication on PAN-OS, affecting versions v11.2, v11.1, v10.2, and v10.1.
- CVE-2025-0108 is rated 8.8 on the CVSS scale, indicating high severity.
- Exploitation attempts have increased from 2 to 25 reported malicious IPs within days of the vulnerability’s disclosure.
- The flaw allows potential chaining with other vulnerabilities, enhancing the attacker’s capability to compromise systems.
- Palo Alto’s advisory recommends immediate patching and restricting management interface access to trusted IPs.