Firewall Fiasco: PAN-OS Bug Leaves Networks Vulnerable!
Threat actors are exploiting a newly disclosed vulnerability, CVE-2025-0108, in Palo Alto Networks PAN-OS firewalls. Researchers observe attempts to bypass authentication and access PHP scripts, risking data integrity. Organizations using PAN-OS firewalls should patch immediately or face the wrath of cyber tricksters who never take a day off!

Hot Take:
Who knew that firewalls, the supposed guardians of our networks, could be so easily duped by a few wayward PHP scripts? It seems that while PAN-OS firewalls were busy playing bouncer, someone found the back door! It’s a classic case of a security guard who forgot to lock the gate. Time for Palo Alto Networks to patch things up before more unwanted guests crash the party.
Key Points:
- Threat actors are actively exploiting a PAN-OS firewall vulnerability, CVE-2025-0108.
- Honeypots detected multiple attempts originating from 19 different IPs.
- The bug allows for authentication bypass, though not remote code execution.
- Exploitation risk increases when the management interface is exposed to untrusted networks.
- Assetnote pinpointed the flaw to improper URL decoding and path handling discrepancies.
Already a member? Log in here