Palo Alto Networks has disclosed a critical vulnerability (CVE-2025-010) in its PAN-OS software that could allow attackers to bypass authentication on the management web interface. While the vulnerability is rated as HIGH severity, Palo Alto Networks suggests a MODERATE urgency for remediation, given that exploitation requires specific configurations (e.g., internet-facing management interfaces). Palo Alto Networks has emphasized that this vulnerability does not affect its Cloud NGFW or Prisma Access solutions. To mitigate this risk, Palo Alto Networks recommends restricting access to trusted internal IP addresses and following best practices for securing administrative access. The risk is highest for systems where access to the management web interface is enabled from untrusted networks or the internet either directly or through a dataplane interface with a management profile enabled. Palo Alto Networks has stated that it is not aware of any malicious exploitation of this vulnerability in the wild as of now. The vulnerability stems from an authentication bypass issue in the PAN-OS management web interface.
This Cyber News was published on cybersecuritynews.com. Publication date: Thu, 13 Feb 2025 02:40:16 +0000