Palo Alto Vulnerability Actively Exploited in the Wild

Published:

spot_img

Urgent Security Alert: Exploitation of Authentication Bypass Flaw in Palo Alto Networks PAN-OS

Cybersecurity Alert: Exploitation of Critical Flaw in Palo Alto Networks PAN-OS

In a growing cyber threat, attackers are exploiting a critical authentication bypass vulnerability identified in Palo Alto Networks’ PAN-OS software, allowing unauthorized users to circumvent security measures and execute specific PHP scripts. Designated as CVE-2025-0108, this zero-day flaw was disclosed on February 12 and is now of significant concern for cybersecurity professionals.

The Cybersecurity and Infrastructure Security Agency (CISA), alongside numerous security researchers, has reported a surge in attacks leveraging this vulnerability, affecting various PAN-OS versions including v11.2, v11.1, v10.2, and v10.1. Despite patches being released to remediate the issue, researchers from GreyNoise noted a dramatic increase in malicious IP addresses targeting vulnerable systems—from just two on February 13 to 25 by February 18—underscoring the urgency of the situation.

This flaw enables attackers to access the management interface of PAN-OS firewall devices, potentially compromising system integrity and confidentiality. Although the PHP scripts invoked do not directly facilitate remote code execution, they can lead to further exploits if other vulnerabilities are present. Industry experts have observed instances where CVE-2025-0108 was combined with two additional flaws, demonstrating attackers’ readiness to exploit every avenue.

Experts emphasize the importance of immediate action. "Organizations relying on PAN-OS firewalls should assume that unpatched devices are being targeted," cautioned Noah Stone of GreyNoise Intelligence. CISA’s addition of this vulnerability to its Known Exploited Vulnerabilities Catalog signals a critical call to action for affected organizations to implement available patches promptly.

For the safety of sensitive data and network integrity, it is imperative that organizations not only apply updates but also restrict access to the management interface, thus fortifying their defenses against this alarming and active threat.

spot_img

Related articles

Recent articles

Gulf Bank Strengthens Shareholder Value with 9% Cash Dividends and 5% Bonus Shares Approval

Gulf Bank Strengthens Shareholder Value with 9% Cash Dividends and 5% Bonus Shares Approval Gulf Bank convened its Ordinary General Assembly on Saturday, achieving a...

Afreximbank Strengthens Global Reach with Season II of ‘Impact Stories’ Documentary Series

Afreximbank Strengthens Global Reach with Season II of ‘Impact Stories’ Documentary Series Launch of Season Two The African Export-Import Bank (Afreximbank) has announced the launch of...

Pune Cyber Police Uncover ₹10.74 Crore Digital Arrest Fraud, Arrest Solapur Suspect

Pune Cyber Police Uncover ₹10.74 Crore Digital Arrest Fraud, Arrest Solapur Suspect An 82-year-old man from Pune fell victim to a sophisticated cyber fraud scheme...

GlassWorm Supply-Chain Attack Escalates, Exploiting 72 Malicious Open VSX Extensions to Target Developers

GlassWorm Supply-Chain Attack Escalates, Exploiting 72 Malicious Open VSX Extensions to Target Developers Cybersecurity researchers have identified a new phase in the GlassWorm campaign, marking...