On-Demand Webinar: Deep Session Inspection and rich metadata can change your security game.

CVE-2025-0108

CVE-2025-0108: PAN-OS Management Interface Authentication Bypass Explained

Vulnerability Overview


CVE ID:

CVE-2025-0108


CVE Title:

PAN-OS management web interface — authentication bypass via path confusion


Severity:

Critical


Exploit Status:

Public PoCs exist and active exploitation has been observed (vendor, GreyNoise, Shadowserver, media).


Business Risk:

Unauthorized access to management PHP endpoints can expose configs and sensitive data and enable follow-on attacks.

Summary

A path-and-header mismatch between the PAN-OS Nginx proxy and downstream Apache/PHP lets an unauthenticated network attacker craft multi-encoded requests that reach protected PHP scripts without logging in. The flaw undermines confidentiality and integrity of the management plane and has been weaponized in the wild.

Urgent Actions Required

Which Systems Are Vulnerable to CVE-2025-0108?

Technical Overview

How Does the CVE-2025-0108 Exploit Work?

The attack typically follows these steps:

How Does the CVE-2025-0108 Exploit Work

What Causes CVE-2025-0108?

Vulnerability Root Cause:

PAN-OS’s management web interface doesn’t enforce authentication for some PHP scripts. An attacker with network access can call those scripts to bypass login — not RCE, but it can expose sensitive data and harm device integrity.

How Can You Mitigate CVE-2025-0108?

If immediate patching is delayed or not possible:

  • Restrict access to the PAN-OS management web interface to trusted internal IP addresses only.
  • Follow Palo Alto Networks’ recommended deployment and management access security guidelines.
  • Disable external exposure of the management interface to reduce attack surface.
  • Continuously monitor for unusual or unauthorized access attempts to the management interface.

Which Assets and Systems Are at Risk?

Asset Types Affected:

Business-Critical Systems at Risk:

Exposure Level:

Will Patching CVE-2025-0108 Cause Downtime?

Patch application impact: Low. Updating to fixed PAN-OS versions resolves the issue with minimal downtime.

How Can You Detect CVE-2025-0108 Exploitation?

Exploitation Signatures:

Indicators of Compromise (IOCs/IOAs):

Behavioral Indicators:

Alerting Strategy:

Remediation & Response

Mitigation Steps if No Patch:

Remediation Timeline:

Rollback Plan:

CVSS Breakdown Table

MetricValue Description
Base Score9.1Critical severity, per CVSS v3.1 base score
Attack VectorNetworkExploited remotely through the PAN-OS management web interface
Attack ComplexityLowExploitation requires no special conditions
Privileges RequiredNoneNo authentication or credentials are needed
User Interaction NoneExploitation occurs without user action
Scope UnChanged Impact is limited to the affected system component
Confidentiality Impact HighAllows exposure of sensitive configuration or data
Integrity ImpactHighEnables unauthorized modification or control
Availability ImpactNoneReferences indicate no impact on service availability

Related Readings

One Platform for All Adversaries

See Fidelis in action. Learn how our fast and scalable platforms provide full visibility, deep insights, and rapid response to help security teams across the World protect, detect, respond, and neutralize advanced cyber adversaries.