HTTP: Palo Alto Networks PAN-OS Authentication Bypass

This signature detects attempts to exploit a known vulnerability against Palo Alto. A successful attack can lead to sensitive information disclosure.

Extended Description

An authentication bypass in the Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to bypass the authentication otherwise required by the PAN-OS management web interface and invoke certain PHP scripts. While invoking these PHP scripts does not enable remote code execution, it can negatively impact integrity and confidentiality of PAN-OS. You can greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended best practices deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 . This issue does not affect Cloud NGFW or Prisma Access software.

Affected Products

Paloaltonetworks pan-os

Short Name
HTTP:CTS:PL-ALTO-NW-AUTH-BYPASS
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
Alto Authentication Bypass CVE-2025-0108 Networks PAN-OS Palo
Release Date
03/10/2025
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3789
False Positive
Unknown
Vendors

Paloaltonetworks

Found a potential security threat?