Palo Alto Firewall Vulnerability CVE-2025-0108 Exploited in the Wild

1 views 2 minutes read

A critical Palo Alto Firewall Vulnerability has been confirmed to be under active exploitation.

The security flaw tracked as CVE-2025-0108, allows unauthorized attackers to gain access to the firewall’s management interface, potentially leading to system compromise.

Palo Alto Networks released a patch on February 12, 2025, but security researchers and threat intelligence firms have already detected malicious exploitation attempts.

According to Palo Alto Networks, attackers are leveraging this flaw to bypass authentication and execute arbitrary PHP scripts on affected devices. In some cases, it has been chained with CVE-2024-9474, a previously exploited vulnerability, to achieve remote code execution.

Cybersecurity experts are urging organizations to apply the patch immediately to avoid falling victim to potential cyberattacks.

Key Takeaway to Palo Alto Firewall Vulnerability:

  • CVE-2025-0108 is actively being exploited. Organizations must patch their systems immediately to prevent unauthorized access and potential breaches.

CVE-2025-0108: Palo Alto Firewall Vulnerability Under Attack

How Was the Vulnerability Discovered?

The Palo Alto Firewall Vulnerability, CVE-2025-0108, was first disclosed on February 12, 2025, when Palo Alto Networks published an official advisory.

Security firm Assetnote discovered the flaw and released technical details on the same day, explaining how it could be exploited by attackers.

GreyNoise, a threat intelligence company, detected the first real-world exploitation attempts on February 13, 2025.

While the exact goals of the attackers remain unclear, GreyNoise has confirmed that multiple malicious entities are actively scanning for and attempting to exploit unpatched devices.

What Does CVE-2025-0108 Do?

The Palo Alto Firewall Vulnerability is an authentication bypass flaw that allows an attacker to:

  • Access the management interface of PAN-OS devices without authentication.
  • Execute certain PHP scripts, potentially leading to privilege escalation.
  • Chain it with CVE-2024-9474 to enable remote code execution (RCE).

Security researchers warn that combining these vulnerabilities could allow attackers to take complete control of unpatched systems.

Who Is Being Targeted?

Security firm Shadowserver Foundation found that 3,500 PAN-OS management interfaces were publicly exposed as of February 14, 2025.

This means thousands of organizations are at risk, particularly those with internet-facing PAN-OS management interfaces.

Proof-of-Concept (PoC) Exploits and Attack Trends

A publicly available Proof-of-Concept (PoC) exploit has surfaced, making it easier for cybercriminals to launch attacks. Palo Alto Networks confirmed that it has observed multiple exploit attempts using this PoC in combination with CVE-2024-9474.

The cybersecurity community is concerned that more attackers will attempt to weaponize the vulnerability in the coming weeks.

A Real-Life Example of Similar Exploits

This situation is eerily similar to the 2023 Fortinet firewall breach, where attackers exploited CVE-2023-27997, a critical authentication bypass vulnerability.

Hackers used this flaw to gain unauthorized access to corporate networks worldwide, causing millions of dollars in damages.

How to Protect Your Organization

Immediate Actions to Take:

  • Apply the Patch – Palo Alto Networks released a patch on February 12, 2025. Install it immediately.
  • Disable Internet-Facing Management Interfaces – If possible, restrict access to the management interface to internal networks only.
  • Implement Strong Access Controls – Use multi-factor authentication (MFA) and strong passwords for administrative accounts.
  • Monitor for Exploitation Attempts – Use threat intelligence tools like GreyNoise to track any suspicious activity targeting your infrastructure.
  • Check for Indicators of Compromise (IoCs) – Palo Alto Networks has shared details on IoCs. Review logs for any unauthorized access attempts.

About Palo Alto Networks

Palo Alto Networks is a global cybersecurity company known for its next-generation firewall solutions. The company provides advanced threat detection, network security, and cloud security solutions to protect organizations from cyber threats.

Rounding Up

The Palo Alto Firewall Vulnerability, CVE-2025-0108, is a serious threat that has already been actively exploited by malicious actors.

If left unpatched, attackers could gain unauthorized access to PAN-OS firewalls, execute arbitrary PHP scripts, and even achieve remote code execution. Organizations should act immediately by installing patches and implementing security best practices to mitigate risks.


FAQs

What is the Palo Alto Firewall Vulnerability CVE-2025-0108?

  • It is an authentication bypass flaw in PAN-OS that allows attackers to gain unauthorized access to management interfaces and execute malicious commands.

How is CVE-2025-0108 being exploited?

  • Attackers are using publicly available PoC exploits to target unpatched Palo Alto Networks firewalls.

Has Palo Alto Networks released a patch?

  • Yes, a security update was released on February 12, 2025. Users are strongly advised to apply the patch immediately.

Who is at risk?

  • Any organization using internet-exposed PAN-OS management interfaces is vulnerable to attacks.

What should organizations do to protect themselves?

  • Install the latest security patch, restrict management interface access, enable MFA, and monitor for suspicious activity.

Has a similar vulnerability been exploited before?

  • Yes, a comparable attack happened in 2023, when hackers exploited CVE-2023-27997 in Fortinet firewalls, leading to widespread breaches.

Leave a Comment

About Us

CyberSecurityCue provides valuable insights, guidance, and updates to individuals, professionals, and businesses interested in the ever-evolving field of cybersecurity. Let us be your trusted source for all cybersecurity-related information.

Editors' Picks

Trending News

©2010 – 2025 – All Right Reserved | Designed & Powered by VexaPlus Technologies

CyberSecurityCue (Cyber Security Cue) Logo
Subscribe To Our Newsletter

Subscribe To Our Newsletter

Join our mailing list for the latest news and updates.

You have Successfully Subscribed!

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More