Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

Palo Alto Networks PAN-OS Authentication Bypass: A Growing Security Concern



Palo Alto Networks PAN-OS Authentication Bypass: A Growing Security Concern
Hackers are exploiting a recently fixed vulnerability in Palo Alto Networks firewalls, allowing them to bypass authentication and gain access to sensitive system data. This exploit has the potential to compromise the integrity and confidentiality of organizations that rely on these firewalls for network security.

  • Hackers are exploiting a recently fixed vulnerability (CVE-2025-0108) in Palo Alto Networks PAN-OS firewalls to bypass authentication and gain access to sensitive system data.
  • The vulnerability was discovered by security researchers at Assetnote and has been publicly disclosed, indicating potential widespread exploitation.
  • Over 4,400 PAN-OS devices have been found exposing their management interface online, highlighting a growing security concern for organizations relying on these firewalls.
  • Applying available patches and restricting access to firewall management interfaces is recommended to mitigate the risk associated with unpatched PAN-OS devices.



  • Hackers are taking advantage of a recently fixed vulnerability (CVE-2025-0108) in Palo Alto Networks PAN-OS firewalls, allowing them to bypass authentication and gain access to sensitive system data. This exploit has the potential to compromise the integrity and confidentiality of organizations that rely on these firewalls for network security.

    The vulnerability was discovered and reported to Palo Alto Networks by security researchers at Assetnote. They published a detailed write-up with complete exploitation details when the patch was released, providing insight into how this flaw can be leveraged to extract sensitive system data, retrieve firewall configurations, or manipulate certain settings within PAN-OS. The exploit works by leveraging a path confusion between Nginx and Apache in PAN-OS, allowing bypassing authentication.

    Threat monitoring platform GreyNoise logged exploitation attempts targeting unpatched PAN-OS firewalls. These attacks began on February 13, at 17:00 UTC, and appear to originate from several IP addresses, potentially indicating exploitation efforts from distinct threat actors. The fact that the PoC (Proof of Concept) is public suggests that this vulnerability is likely to be exploited in the coming days.

    The exposure of vulnerable devices online has been revealed by Macnica researcher Yutaka Sejiyama, who stated that there are currently over 4,400 PAN-OS devices exposing their management interface online. This highlights a growing security concern for organizations relying on these firewalls and emphasizes the importance of patching this vulnerability as soon as possible.

    To defend against ongoing exploitation activity, it is recommended to apply available patches and restrict access to firewall management interfaces. This will help mitigate the risk associated with unpatched PAN-OS devices and protect against potential attacks.

    The SonicWall firewall bug that was previously discovered in January also leverages similar methods for exploiting vulnerabilities, which further highlights the importance of keeping software up-to-date and patched. The Microsoft February 2025 Patch Tuesday fixes four zero-days and fifty-five flaws, including a vulnerability in Windows 10 KB5051974 that forces the installation of a new Microsoft Outlook app.

    In conclusion, the Palo Alto Networks PAN-OS authentication bypass exploit is a significant security concern for organizations relying on these firewalls. It is crucial to apply available patches as soon as possible and restrict access to firewall management interfaces to mitigate potential attacks.

    Related Information:

  • https://www.bleepingcomputer.com/news/security/hackers-exploit-authentication-bypass-in-palo-alto-networks-pan-os/


  • Published: Fri Feb 14 16:28:28 2025 by llama3.2 3B Q4_K_M













     |   |   |  Sub Stack  |  Blue Sky


    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us