Palo Alto Vulnerability Actively Exploited in the Wild

Published:

spot_img

Urgent Security Alert: Exploitation of Authentication Bypass Flaw in Palo Alto Networks PAN-OS

Cybersecurity Alert: Exploitation of Critical Flaw in Palo Alto Networks PAN-OS

In a growing cyber threat, attackers are exploiting a critical authentication bypass vulnerability identified in Palo Alto Networks’ PAN-OS software, allowing unauthorized users to circumvent security measures and execute specific PHP scripts. Designated as CVE-2025-0108, this zero-day flaw was disclosed on February 12 and is now of significant concern for cybersecurity professionals.

The Cybersecurity and Infrastructure Security Agency (CISA), alongside numerous security researchers, has reported a surge in attacks leveraging this vulnerability, affecting various PAN-OS versions including v11.2, v11.1, v10.2, and v10.1. Despite patches being released to remediate the issue, researchers from GreyNoise noted a dramatic increase in malicious IP addresses targeting vulnerable systems—from just two on February 13 to 25 by February 18—underscoring the urgency of the situation.

This flaw enables attackers to access the management interface of PAN-OS firewall devices, potentially compromising system integrity and confidentiality. Although the PHP scripts invoked do not directly facilitate remote code execution, they can lead to further exploits if other vulnerabilities are present. Industry experts have observed instances where CVE-2025-0108 was combined with two additional flaws, demonstrating attackers’ readiness to exploit every avenue.

Experts emphasize the importance of immediate action. "Organizations relying on PAN-OS firewalls should assume that unpatched devices are being targeted," cautioned Noah Stone of GreyNoise Intelligence. CISA’s addition of this vulnerability to its Known Exploited Vulnerabilities Catalog signals a critical call to action for affected organizations to implement available patches promptly.

For the safety of sensitive data and network integrity, it is imperative that organizations not only apply updates but also restrict access to the management interface, thus fortifying their defenses against this alarming and active threat.

spot_img

Related articles

Recent articles

84 Hours of Internet Blackout in Iran Amid Growing Unrest

Iran's Internet Blackout: A Deepening Crisis Amid Unrest Four Days Without Connectivity Iran has plunged into a state of digital isolation as an internet blackout enters...

NSA Appoints Timothy Kosiba to Lead Cybersecurity Strategy

Appointment of Timothy Kosiba as NSA Deputy Director: A Leadership Milestone The National Security Agency (NSA) has recently announced a pivotal leadership change with the...

Comprehensive Threat Analysis of Cyber Campaigns in the UAE for H1 2025

Understanding the Cybersecurity Threat Landscape in the UAE: Insights from 2025 An analysis by Alain Penel, Vice President for the Middle East, Turkey, and CIS...

2026 Business Blast Radius: Dr. Amit Chaubey on Cyber Disruption as a Sovereign Risk

The 2026 Business Blast Radius: Insights from Dr. Amit Chaubey In a recent conversation with The Cyber Express, Dr. Amit Chaubey, the Managing Director and...