Palo Alto Networks Patches Security Flaw: PAN-OS Gets a Much-Needed Update!
Palo Alto Networks has patched a high-severity flaw in its PAN-OS software that could allow authentication bypass. The vulnerability, CVE-2025-0108, has a CVSS score of 7.8 but drops to 5.1 with restricted management interface access. Users are advised to update to the latest versions and limit interface exposure.

Hot Take:
Who needs a key to the castle when you can just stroll in through the management web interface like it’s a Sunday picnic? Palo Alto Networks just handed over a tutorial on how to bypass their own authentication. Good job, folks! Let’s hope their next patch isn’t like duct tape on a sinking ship. But hey, at least they remembered to say “Oops!” and slapped some band-aids on those other pesky vulnerabilities too!
Key Points:
- Palo Alto Networks has patched a high-severity flaw in PAN-OS software, CVE-2025-0108, with a CVSS score of 7.8.
- The flaw allows unauthenticated attackers to bypass the management web interface’s authentication.
- The vulnerability arises from a discrepancy in how Nginx and Apache components handle requests.
- Patches are released for PAN-OS versions 11.2, 11.1, 10.2, and 10.1.
- Two other vulnerabilities, CVE-2025-0109 and CVE-2025-0110, have also been addressed.
Already a member? Log in here