Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Palo Alto Networks PAN-OS Vulnerability Enables Admin to Execute Root User Actions

Posted on June 12, 2025June 12, 2025 By CWS

A vital command injection vulnerability in Palo Alto Networks PAN-OS working system allows authenticated administrative customers to escalate privileges and execute instructions as the foundation consumer. 

Designated as CVE-2025-4231, this medium-severity vulnerability impacts a number of variations of the corporate’s firewall working system and poses important safety dangers when administration interfaces are uncovered to untrusted networks. 

The vulnerability, found by safety researcher spcnvdr, highlights the continued challenges in securing community infrastructure elements and the significance of implementing correct entry controls for administrative interfaces.

PAN-OS Net Interface Vulnerability

The CVE-2025-4231 vulnerability represents a traditional command injection flaw labeled below CWE-77: Improper Neutralization of Particular Parts utilized in a Command. 

This safety weak point permits malicious actors to inject arbitrary instructions into the PAN-OS administration internet interface, subsequently executing these instructions with root-level privileges. 

The vulnerability carries a CVSS v4.0 base rating of 6.1, categorizing it as medium severity, although the potential for full system compromise elevates its sensible significance.

The assault vector requires community entry to the administration internet interface and profitable authentication with administrative credentials. 

As soon as these conditions are met, the vulnerability may be exploited with low assault complexity and requires no consumer interplay, making it significantly harmful in environments the place administrative entry controls are inadequate. 

The CAPEC-233 Privilege Escalation sample precisely describes the assault methodology, the place professional administrative entry serves as a stepping stone to finish system management.

Technical evaluation reveals that the vulnerability stems from insufficient enter validation inside the internet administration interface, permitting specifically crafted instructions to bypass safety controls and execute with elevated privileges. 

The command injection happens when user-supplied enter is processed with out correct sanitization, enabling attackers to append malicious instructions that the system interprets and executes as a part of professional administrative operations.

Threat FactorsDetailsAffected ProductsPAN-OS 10.1 (all variations), PAN-OS 10.2 (variations 10.2.0 by way of 10.2.7), and PAN-OS 11.0 (variations 11.0.0 by way of 11.0.2)ImpactPrivilege escalationExploit Prerequisites1. Community entry to administration interface 2. Legitimate admin credentials 3. Publicity of administration interface to untrusted networksCVSS 3.1 Score6.1 (Medium)

The vulnerability impacts particular variations of PAN-OS, with essentially the most vital publicity affecting PAN-OS 10.1 (all variations), PAN-OS 10.2 (variations 10.2.0 by way of 10.2.7), and PAN-OS 11.0 (variations 11.0.0 by way of 11.0.2). 

Importantly, PAN-OS 11.1, PAN-OS 11.2, Cloud NGFW, and Prisma Entry stay unaffected by this vulnerability, offering aid for organizations utilizing these newer platforms.

Organizations with internet-facing administration interfaces face the very best danger, because the vulnerability allows distant exploitation by way of the community assault vector. 

Mitigation Methods 

Rapid remediation requires upgrading to patched variations, particularly PAN-OS 11.0.3 or later for the 11.0 department, and PAN-OS 10.2.8 or later for the ten.2 department.

Organizations operating PAN-OS 10.1 should improve to both 10.2.8 or 11.0.3 or later variations, as no direct patch exists for the ten.1 department. Legacy installations on unsupported variations require fast migration to supported, patched releases.

Important deployment pointers emphasize limiting administration interface entry to trusted inner IP addresses solely. 

This mitigation technique dramatically reduces the assault floor by stopping exterior menace actors from reaching susceptible administration interfaces. 

Organizations ought to implement bounce field architectures the place administrative entry happens solely by way of designated programs with fastidiously managed community entry.

Community segmentation, entry management lists, and VPN-based administrative entry present layered safety approaches that complement the first remediation technique of upgrading to patched variations.

Automate menace response with ANY.RUN’s TI Feeds—Enrich alerts and block malicious IPs throughout all endpoints -> Request full entry

Cyber Security News Tags:Actions, Admin, Alto, Enables, Execute, Networks, Palo, PANOS, Root, User, Vulnerability

Post navigation

Previous Post: Multiple GitLab Vulnerabilities Allow Attackers to Achieve Complete Account Takeover
Next Post: OpenPGP.js Vulnerability Let Attackers Spoof Message Signature Verification

Related Posts

Chrome 0-day Vulnerability Exploited in the Wild to Execute Arbitrary Code Cyber Security News
20 Years old Proxy Botnet Network Dismantled That Exploits 1000 Unique Unpatched Devices Weekly Cyber Security News
CISOs Guide to Regulatory Compliance in Global Landscapes Cyber Security News
Microsoft Probes Leak in Early Alert System as Chinese Hackers Exploit SharePoint Vulnerabilities Cyber Security News
How Smart Timesheet Software Is Changing the Way of Work Cyber Security News
Konfety Android Malware on Google Play Uses ZIP Manipulation to Imitate Legitimate Apps Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Chrome High-Severity Vulnerabilities Allows Memory Manipulation and Arbitrary Code Execution
  • Threat Actors Attacking Fans and Teams of Belgian Grand Prix With Phishing Campaigns
  • Tea App Takes Messaging System Offline After Second Security Issue Reported
  • How to Respond to a Phishing Test in Your Company
  • ArmouryLoader Bypassing System Security Protections and Inject Malicious Codes

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Chrome High-Severity Vulnerabilities Allows Memory Manipulation and Arbitrary Code Execution
  • Threat Actors Attacking Fans and Teams of Belgian Grand Prix With Phishing Campaigns
  • Tea App Takes Messaging System Offline After Second Security Issue Reported
  • How to Respond to a Phishing Test in Your Company
  • ArmouryLoader Bypassing System Security Protections and Inject Malicious Codes

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News