Summary
Security updates address vulnerabilities, including 2 with a severity of “high” in PAN-OS. These vulnerabilities, if exploited, could allow an attacker to bypass authentication and execute arbitrary commands.
Note: CVE-2025-0111 is actively being exploited online.
Note: CVE-2025-0108 is actively being exploited online.
Note: A Proof of Concept (PoC) for exploiting CVE-2025-0108 is available online.
Risk
Vulnerability impact estimate on the target community: Critical (76.66)
Type
- Arbitrary Code Execution
- Authentication Bypass
Affected products and/or versions
PAN-OS OpenConfig Plugin, versions prior to 2.1.2
PAN-OS
- 11.2.x, version 11.2.4 and earlier
- 11.1.x, version 11.1.6 and earlier
- 11.0 (EoL)
- 10.2.x, version 10.2.13 and earlier
- 10.1.x, version 10.1.14 and earlier
Mitigation actions
In line with vendor statements, it is recommended to update vulnerable products following the indications of the security bulletins reported in the References section.
Below are only the CVEs related to the vulnerabilities with “high” severity:
References
https://security.paloaltonetworks.com/CVE-2025-0108
https://security.paloaltonetworks.com/CVE-2025-0110
https://security.paloaltonetworks.com/CVE-2025-0111
1This estimate is made taking into account several parameters, including: CVSS, availability of patches/workarounds and PoC, diffusion of the affected software/devices in the reference community.