Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

Exploiting Vulnerability in Palo Alto Networks PAN-OS Firewalls: A Growing Concern for Cybersecurity



Recently, a vulnerability was discovered in Palo Alto Networks PAN-OS firewalls, tracked as CVE-2025-0108, which has been exploited by threat actors to bypass authentication and invoke certain PHP scripts. This article will delve into the details of this vulnerability, its impact on cybersecurity, and what steps can be taken to secure vulnerable devices.

  • Palo Alto Networks PAN-OS firewalls have been vulnerable to exploitation due to a recently discovered CVE-2025-0108.
  • Threat actors have been attempting to use a PoC exploit code for the vulnerability to bypass authentication and invoke PHP scripts in the PAN-OS management interface.
  • The vulnerability allows unauthenticated attackers with network access to bypass authentication and extract data from vulnerable devices, including firewall configurations.
  • Patches have been released by Palo Alto Networks to address the vulnerability, and it is recommended to restrict access to trusted internal IP addresses to minimize the risk of exploitation.




  • Recently, a vulnerability was discovered in Palo Alto Networks PAN-OS firewalls, tracked as CVE-2025-0108, which has been exploited by threat actors to bypass authentication and invoke certain PHP scripts. This article will delve into the details of this vulnerability, its impact on cybersecurity, and what steps can be taken to secure vulnerable devices.


    Palo Alto Networks PAN-OS firewalls have long been considered a robust security solution for organizations, providing advanced threat protection and network segmentation capabilities. However, like any complex system, vulnerabilities can arise. The recent discovery of CVE-2025-0108 in Palo Alto Networks PAN-OS firewalls is a prime example of this.

    According to researchers at the Shadowserver Foundation, who first observed attempts to exploit this vulnerability on February 13, 2024, threat actors have been attempting to use a recently published PoC exploit code for CVE-2025-0108. The attackers attempted to use this exploit to bypass authentication and invoke certain PHP scripts in the PAN-OS management interface.

    GreyNoise, a cybersecurity firm, also confirmed that they had observed active exploitation of this vulnerability. In their statement, GreyNoise warned organizations relying on PAN-OS firewalls to assume that unpatched devices are being targeted and take immediate steps to secure them.

    The vulnerability itself resides in the PAN-OS management web interface. An unauthenticated attacker with network access can exploit the vulnerability to bypass authentication and invoke certain PHP scripts. The risk is higher if the management interface is accessible from the internet or an untrusted network, directly or via a dataplane interface with a management profile.

    Cybersecurity firm Assetnote discovered this vulnerability and published a detailed analysis of the issue. According to their findings, attackers can exploit the flaw to extract data from vulnerable devices, including firewall configurations.

    Assetnote states that CVE-2025-0108 exploits improper URL decoding in PAN-OS firewalls, allowing attackers to bypass authentication. The root cause of the issue is that Nginx and Apache handle encoded paths differently, leading to directory traversal and unauthorized execution of PHP scripts. Since Nginx disables authentication for certain paths, attackers can access the PAN-OS management interface without credentials, resulting in a full authentication bypass.

    Assetnote's report highlights the importance of secure coding practices and the need for vendors to regularly review their products for vulnerabilities. The discovery of CVE-2025-0108 serves as a reminder that even seemingly robust security solutions are not immune to exploitation.

    In response to this vulnerability, Palo Alto Networks has released patches for affected versions of PAN-OS. The company recommends restricting access to trusted internal IP addresses to minimize the risk of exploitation.

    As with any significant cybersecurity update, it is essential for organizations to take proactive steps to secure their networks and devices. This includes applying patches to vulnerable systems, ensuring that management interfaces are accessible only from trusted sources, and regularly monitoring network activity for signs of suspicious behavior.

    The discovery of CVE-2025-0108 in Palo Alto Networks PAN-OS firewalls highlights the ongoing cat-and-mouse game between cybersecurity professionals and threat actors. As new vulnerabilities are discovered, it is essential to remain vigilant and take swift action to secure our networks and devices.

    In conclusion, the recent exploitation of CVE-2025-0108 in Palo Alto Networks PAN-OS firewalls serves as a reminder of the importance of robust security measures and the need for vendors to regularly review their products for vulnerabilities. As we move forward, it is essential to remain proactive in securing our networks and devices against emerging threats.



    Related Information:

  • https://securityaffairs.com/174237/hacking/exploitation-palo-alto-networks-pan-os-firewalls-bug.html

  • https://nvd.nist.gov/vuln/detail/CVE-2025-0108

  • https://www.cvedetails.com/cve/CVE-2025-0108/


  • Published: Sat Feb 15 10:49:28 2025 by llama3.2 3B Q4_K_M













     |   |   |  Sub Stack  |  Blue Sky


    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us