CVE-2025-0111
Description
An authenticated file read vulnerability in the Palo Alto Networks PAN-OS software enables an authenticated attacker with network access to the management web interface to read files on the PAN-OS filesystem that are readable by the “nobody” user.
You can greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended best practices deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 .
This issue does not affect Cloud NGFW or Prisma Access software.
Available Exploits
Related News
Related content: How to filter spam with Spamassassin and Postfix in Debian CVE-2025-0114 PAN-OS: Denial of Service (DoS) in GlobalProtect (Severity: MEDIUM) PAN-SA-2025-0007 Chromium: Monthly Vulnerability Update (March 2025) (Severity: HIGH) CVE-2025-0111 P…
Related content: How to filter spam with Spamassassin and Postfix in Debian CVE-2025-0114 PAN-OS: Denial of Service (DoS) in GlobalProtect (Severity: MEDIUM) PAN-SA-2025-0007 Chromium: Monthly Vulnerability Update (March 2025) (Severity: HIGH) CVE-2025-0111 P…
A vulnerability was identified in Palo Alto PAN-OS. A remote attacker can exploit this vulnerability to trigger information disclosure on the targeted system. Note: CVE-2025-0111 is being exploited in the wild. Exploitation of CVE-2025-0111 will... I…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two critical security vulnerabilities to its Known Exploited The post CVE-2025-0111 & CVE-2025-23209: Palo Alto Firewalls and Craft CMS Under Active Attack appeared first on Cybersecurity News.
CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2025-23209 Craft CMS Code Injection Vulnerability CVE-2025-0111 Palo Alto Networks PAN-OS File Read Vulnerab…
Affected Products
Affected Versions:
Affected Versions:
Known Exploited Vulnerability
This vulnerability is actively being exploited in the wild
Remediation Status
Due Date
Added to KEV
Required Action
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.