Components Affected
• PAN-OS 10.1 versions earlier than PAN-OS 10.1.14-h9
• PAN-OS 10.2 versions earlier than PAN-OS 10.2.13-h3
• PAN-OS 11.1 versions earlier than PAN-OS 11.1.6-h1
• PAN-OS 11.2 versions earlier than PAN-OS 11.2.4-h4
• PAN-OS OpenConfig Plugin versions earlier than 2.1.2
Overview
Multiple vulnerabilities were identified in Palo Alto PAN-OS. Where a remote attacker could exploit
some of these vulnerabilities to trigger remote code execution, data manipulation and security
restriction bypass on the targeted system.
Description
Multiple vulnerabilities have been discovered in Palo Alto PAN-OS, the most severe of which could
allow for Authentication Bypass. Details of the most severe vulnerabilities are as follows:
• CVE-2025-0108 – Authentication Bypass in the Management Web Interface
• CVE-2025-0109- Unauthenticated File Deletion Vulnerability on the Management Web
Interface
• CVE-2025-0110 – Command Injection Vulnerability in OpenConfig Plugin
Impact
• Remote Code Execution
• Data Manipulation
• Security Restriction Bypass
Solution/ Workarounds
AR DATE: 12 SEP 2023 REF NO: CERT/NCSOC/23/0193 Before installation of the software, please visit the vendor web-site for more details.
Apply fixes issued by the vendor:
• https://security.paloaltonetworks.com/CVE-2025-0108
• https://security.paloaltonetworks.com/CVE-2025-0109
• https://security.paloaltonetworks.com/CVE-2025-0110
Reference
• https://securityadvisories.paloaltonetworks.com/
• https://www.hkcert.org/security-bulletin/palo-alto-pan-os-multiplevulnerabilities_20250213
Disclaimer
The information provided herein is on an “as is” basis, without warranty of any kind.