Palo Alto Firewall Flaw Exploited in Attacks

Critical Vulnerability Puts Palo Alto Firewalls at Risk

A major security flaw has been discovered in Palo Alto Networks’ PAN-OS firewalls, and hackers are already using it to launch cyberattacks. The vulnerability, identified as CVE-2025-0108, allows attackers to bypass authentication, giving them unauthorized access to certain system functions. This flaw affects the PAN-OS management web interface and has been classified as high-severity due to its potential to compromise security.

Palo Alto Networks has released security patches to fix this vulnerability and is urging users to update their firewalls immediately. The recommended versions that address the issue include:

11.2.4-h4 or later

11.1.6-h1 or later

10.2.13-h3 or later

10.1.14-h9 or later

PAN-OS 11.0 also contains the vulnerability, but Palo Alto Networks will not provide patches since this version has reached its end of life (EoL). The company strongly advises users running this version to upgrade to a supported version to ensure protection.

The vulnerability was first reported by cybersecurity experts who found that attackers could exploit a weakness in PAN-OS by bypassing authentication and executing unauthorized commands. This flaw enables hackers to extract sensitive system data, retrieve firewall configurations, and potentially manipulate security settings.

How Hackers Are Exploiting the Palo Alto Flaw

Hackers are taking advantage of a weakness in how PAN-OS interacts with web servers, specifically a path confusion between Nginx and Apache. This misconfiguration allows attackers to trick the system into thinking they have permission to access restricted parts of the firewall’s management interface.

Once inside, the attacker can:

  • Collect sensitive system data that could help launch further attacks.
  • Modify firewall settings, potentially weakening security defenses.
  • Retrieve firewall configurations, gaining insights into a network’s security structure.

These activities put affected networks at high risk, as hackers could use the gathered information for future cyberattacks or data breaches.

Threat monitoring systems have already detected hackers attempting to exploit this vulnerability. Cybersecurity researchers reported that the attacks began on February 13 at 17:00 UTC and have been traced back to multiple IP addresses. This suggests that different hacker groups are actively trying to take advantage of the flaw.

A security monitoring platform has recorded several exploitation attempts, indicating that hackers are specifically targeting unpatched PAN-OS firewalls. Since the proof-of-concept (PoC) for the exploit is now public, more cybercriminals are expected to use this method to gain unauthorized access to vulnerable systems.

Over 4,400 Firewalls Face Online Exposure

A security researcher discovered that hackers can easily target more than 4,400 PAN-OS devices because their management interfaces remain publicly accessible. These devices face a high risk of attacks, especially if users have not updated them with the latest security patches.

Hackers can scan the internet for vulnerable devices and attempt to gain control over them. Once compromised, the firewall could be used as a gateway to launch further cyberattacks, steal sensitive data, or disrupt network operations.

To defend against these attacks, users should:

  • Immediately update their PAN-OS firewalls to the patched versions provided by Palo Alto Networks.
  • Restrict access to the management interface, allowing only authorized users to connect.
  • Monitor network activity for any signs of unauthorized access attempts.

The ongoing exploitation of this vulnerability highlights the importance of keeping network security systems up to date. Organizations using PAN-OS firewalls must take immediate action to patch their systems and secure their networks from potential cyber threats.

TOP 10 TRENDING ON NEWSINTERPRETATION

Newsom draws Megyn Kelly’s ire after sharing old Trump clips to boost online trolling campaign

A sharp exchange unfolded when a well-known media host...

Shocking Files Reveal Bill Clinton Letter in Epstein’s Infamous ‘Birthday Book’

Oversight Committee Releases New Epstein Records The House Oversight Committee...

McGregor channels Trump populism with Musk support in high-stakes Irish presidential race

In early September 2025, Ireland was taken by surprise...

Federal authorities seize $3 million in crypto linked to ransomware that hit US hospitals

Federal authorities have seized nearly $3 million worth of...

Bernie Sanders backs Zohran Mamdani in New York City mayor race citing grassroots momentum

A major political figure has stepped into the New...

JPMorgan handled $1.1 billion for Jeffrey Epstein despite warnings of criminal ties and reputation risk

JPMorgan Chase, one of America’s biggest banks, had a...

Qualys confirms limited Salesforce data access during Drift hacking campaign raising security concerns

Hackers accessed some Salesforce information from risk management company...

Ashley Hinson sparks clash with Newsom after claiming America should look more like Iowa

A sharp political exchange has broken out after U.S....

WSJ report says malware email linked to Chinese group aimed at U.S. tariff negotiations

U.S. authorities are investigating a suspicious email that carried...

Related Articles

Popular Categories

error: Content is protected !!