On February 12, 2025, Palo Alto Networks announced CVE-2025-0108, a high severity (8.8) authentication bypass vulnerability affecting Palo Alto Networks PAN-OS management web interface.
Successful exploitation of this vulnerability allows unauthenticated attackers with network access to invoke certain PHP scripts without proper authentication. While it does not lead to remote code execution, it impacts the confidentiality and integrity of the affected system.
Cloud NGFW and Prisma Access assets are not affected by this vulnerability. The following PAN-OS versions are affected by CVE-2025-0108:
Note that PAN-OS 11.0 reached end of life (EOL) in November 2024. Because of this, no additional fixes will be released for this version and users are advised to upgrade to a supported version.
Palo Alto Networks has released patches for CVE-2025-0108:
Palo Alto Networks had indicated that the risk from this vulnerability is highest if traffic from external IP addresses is able to access the management interface, either directly or through a dataplane interface that includes a management interface portal. This risk can be reduced by using a jump box to restrict access to only trusted IP addresses.
There is a public proof of concept (PoC) available for CVE-2025-0108. Palo Alto Networks also has observed active attempts to exploit this vulnerability in the wild, including attempts to chain CVE-2025-0108 to CVE-2024-9474 on unpatched and unsecured PAN-OS web management interfaces.
CyCognito published an emerging threat advisory within the CyCognito platform and advises customers to review assets running PAN-OS management services on HTTP/HTTPS ports (e.g., TCP/443, TCP/4443) to assess exposure, even if they are not explicitly identified as running vulnerable versions. While HTTPS is the standard for secure access to the PAN-OS management web interface, HTTP may still be in use due to misconfigurations or non-standard deployments.
Figure 1: The alert sent by CyCognito for CVE-2025-0108
CyCognito is an exposure management platform that reduces risk by discovering, testing and prioritizing security issues. The platform scans billions of websites, cloud applications and APIs and uses advanced AI to identify the most critical risks and guide remediation. Emerging companies, government agencies and Fortune 500 organizations rely on CyCognito to secure and protect from growing threats. Want to see how it works? Check out our website and explore our platform with a self-guided, interactive dashboard product tour. To learn how CyCognito can help you understand your external attack surface and exposed risks, please visit our Contact Us page to schedule a demo.
Emma Zaballos is an avid threat researcher who is passionate about understanding and combatting cybercrime threats. Emma enjoys monitoring dark web marketplaces, profiling ransomware gangs, and using intelligence for understanding cybercrime.
Download the report now to stay ahead of emerging threats and strengthen your organization’s security posture for 2024.
Download the report to learn about the historical trends behind the emergence of exposure management, how to develop a strategic plan and assemble a team to smoothly transition frameworks, and example tech stacks to consider for your organization.
Get a free scan of your attack surface and gain valuable insight into your organization's risk posture by allowing CyCognito to discover, contextualize, and test externally exposed assets on a portion of your parent company or a single subsidiary.
Discover insights on application security, exposure management and other key topics below.
The definitive guide to attack surface management. Learn everything you need to know to reduce your cyber security risk with attack surface management.
Exposure management is a set of processes which allow organizations to assess the visibility, accessibility, and risk factors of their digital assets.
Vulnerability assessment is the process of identifying, quantifying, and prioritizing vulnerabilities in a system.
Explore CyCognito modules ASM, AST and EI in the resources below.
Scalable, continuous, and comprehensive testing for all external assets, all the time.
CyCognito Automated Security Testing dynamically applies payload-based testing techniques across your entire external attack surface.
CyCognito Exploit Intelligence uses threat intelligence about attackers’ behavior and exploitability for enhanced prioritization.