By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: Palo Alto Networks tags new firewall bug as exploited in attacks
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > Palo Alto Networks tags new firewall bug as exploited in attacks
Tech News

Palo Alto Networks tags new firewall bug as exploited in attacks

By admin 5 Min Read
Share
SHARE

Palo Alto Networks warns that a file read vulnerability (CVE-2025-0111) is now being chained in attacks with two other flaws (CVE-2025-0108 with CVE-2024-9474) to breach PAN-OS firewalls in active attacks.

The vendor first disclosed the authentication bypass vulnerability tracked as CVE-2025-0108 on February 12, 2025, releasing patches to fix the vulnerability. That same day, Assetnote researchers published a proof-of-concept exploit demonstrating how CVE-2025-0108 and CVE-2024-9474 could be chained together to gain root privileges on unpatched PAN-OS firewalls.

A day later, network threat intel firm GreyNoise reported that threat actors had begun actively exploiting the flaws, with attempts coming from two IP addresses.

CVE-2024-9474 is a privilege escalation flaw in PAN-OS fixed in November 2024 that allows a PAN-OS administrator to execute commands on firewalls with root privileges. Palo Alto Networks warned at the disclosure that the vulnerability was exploited as a zero-day.

CVE-2025-0111 is a file read vulnerability in PAN-OS, allowing authenticated attackers with network access to the management web interface to read files that are readable by the “nobody” user.

The CVE-2025-0111 flaw was also fixed on February 12, 2025, but the vendor updated its bulletin today to warn that it is also now being used in an exploit chain with the other two vulnerabilities in active attacks.

“Palo Alto Networks has observed exploit attempts chaining CVE-2025-0108 with CVE-2024-9474 and CVE-2025-0111 on unpatched and unsecured PAN-OS web management interfaces,” reads the updated bulletin.

While Palo Alto Networks has not shared how the exploit chain is being abused, BleepingComputer has been told they could be chained together to download configuration files and other sensitive information.

Exploitation activity increases

Not only has the scope broadened, but an update on GreyNoise’s bulletin indicates that the exploitation activity has also increased pace.

GreyNoise reports now seeing 25 IP addresses targeting CVE-2025-0108, whereas its initial report from February 13 only logged two.

The top sources of the attacks are the United States, Germany, and the Netherlands, although this does not mean the attackers are actually based in those locations.

Macnica researcher Yutaka Sejiyama told BleepingComputer that his scans returned thousands of PAN-OS devices that expose their web management interface to the internet.

“For the newly patched CVE-2025-0108 and CVE-2025-0111, the majority of servers that publicly expose their web management interface are still unpatched,” Sejiyama told BleepingComputer.

“Out of 3,490 servers facing the internet, only a few dozen have applied the patch.”

Of these exposed devices, 1,168 have not patched CVE-2025-0108 and CVE-2025-0111 but have patched CVE-2024-9474.

The researcher said that when considering all three flaws chained in the attacks, 65% (2,262 devices) remain vulnerable to all of them.

Patch percentage per country
<strong>Patch percentage per country</strong><br /><em>Source: Sejiyama</em>

Amidst this situation and active exploitation, the U.S. Cybersecurity & Infrastructure Security Agency (CISA) has added CVE-2025-0108 to its ‘Known Exploited Vulnerabilities’ (KEV) catalog.

The organization has given federal agencies until March 11, 2025, to apply the available updates/mitigations or stop using the product.

Update 2/21 – Palo Alot Networks sent BleepingComputer the following comment regarding the above:

Palo Alto Networks is urging customers to immediately patch two vulnerabilities in the PAN-OS web management interface – CVE-2025-0108 and CVE-2025-0111 . These vulnerabilities could allow unauthorized access to the management interface of affected firewalls, potentially leading to system compromise. Exploitation attempts for CVE-2025-0108, which has a publicly available proof-of-concept exploit, have been observed chaining it with CVE-2024-9474 and CVE-2025-0111 on unpatched and unsecured PAN-OS web management interfaces. We continue to monitor the situation and leverage the currently operational mechanisms to detect customer compromises in telemetry and TSFs and support them through the EFR remediations

Customers with any internet-facing PAN-OS management interfaces are strongly urged to take immediate action to mitigate these vulnerabilities. Securing external-facing management interfaces is a fundamental security best practice, and we strongly encourage all organizations to review their configurations to minimize risk.

You Might Also Like

How Gemini CLI 0.9 Enhances Productivity for Developers

Android 16 Security Measures: Identity Check and Advanced Protection

White House Staffers Couldn’t Care Less About the East Wing Demolition

CISA warns of Lanscope Endpoint Manager flaw exploited in attacks

North Korean Hackers Lure Defense Engineers With Fake Jobs to Steal Drone Secrets

TAGGED: Actively Exploited, Authentication Bypass, Firewall, Palo Alto Networks, Vulnerability
Share This Article
Facebook Twitter Copy Link
Previous Article Elite, fearless, generational: Cooper Flagg ready to shine at Madison Square Garden
Next Article OpenAI’s Unified AI Model : ChatGPT Roadmap Reveals AI Future
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

Spain loses €45 billion to absenteeism crisis
Business
Crypto M&A surges 30-fold as niche firms shift to mainstream
Business
Pave Bank raises $39M led by Accel, Tether to expand programmable banking
Crypto
‘9-1-1: Nashville’s Isabelle Tate’s Neuromuscular Disease: Her Health Before She Died at 23
Celebrity
Sonic Team Works on Roadmaps to Decide Which Game to Make in Which Year
Gaming News
How Gemini CLI 0.9 Enhances Productivity for Developers
Tech News
Arsenal star Oleksandr Zinchenko in tears as he's forced off injured for Nottingham Forest
Sports

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

Spain loses €45 billion to absenteeism crisis

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
Spain loses €45 billion to absenteeism crisis
October 23, 2025
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?