Firewall Fiasco: PAN-OS Bug Leaves Networks Vulnerable!

Threat actors are exploiting a newly disclosed vulnerability, CVE-2025-0108, in Palo Alto Networks PAN-OS firewalls. Researchers observe attempts to bypass authentication and access PHP scripts, risking data integrity. Organizations using PAN-OS firewalls should patch immediately or face the wrath of cyber tricksters who never take a day off!

Pro Dashboard

Hot Take:

Who knew that firewalls, the supposed guardians of our networks, could be so easily duped by a few wayward PHP scripts? It seems that while PAN-OS firewalls were busy playing bouncer, someone found the back door! It’s a classic case of a security guard who forgot to lock the gate. Time for Palo Alto Networks to patch things up before more unwanted guests crash the party.

Key Points:

  • Threat actors are actively exploiting a PAN-OS firewall vulnerability, CVE-2025-0108.
  • Honeypots detected multiple attempts originating from 19 different IPs.
  • The bug allows for authentication bypass, though not remote code execution.
  • Exploitation risk increases when the management interface is exposed to untrusted networks.
  • Assetnote pinpointed the flaw to improper URL decoding and path handling discrepancies.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?