Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Palo Alto Networks PAN-OS Vulnerability Enables Admin to Execute Root User Actions

Posted on June 12, 2025June 12, 2025 By CWS

A vital command injection vulnerability in Palo Alto Networks PAN-OS working system allows authenticated administrative customers to escalate privileges and execute instructions as the foundation consumer. 

Designated as CVE-2025-4231, this medium-severity vulnerability impacts a number of variations of the corporate’s firewall working system and poses important safety dangers when administration interfaces are uncovered to untrusted networks. 

The vulnerability, found by safety researcher spcnvdr, highlights the continued challenges in securing community infrastructure elements and the significance of implementing correct entry controls for administrative interfaces.

PAN-OS Net Interface Vulnerability

The CVE-2025-4231 vulnerability represents a traditional command injection flaw labeled below CWE-77: Improper Neutralization of Particular Parts utilized in a Command. 

This safety weak point permits malicious actors to inject arbitrary instructions into the PAN-OS administration internet interface, subsequently executing these instructions with root-level privileges. 

The vulnerability carries a CVSS v4.0 base rating of 6.1, categorizing it as medium severity, although the potential for full system compromise elevates its sensible significance.

The assault vector requires community entry to the administration internet interface and profitable authentication with administrative credentials. 

As soon as these conditions are met, the vulnerability may be exploited with low assault complexity and requires no consumer interplay, making it significantly harmful in environments the place administrative entry controls are inadequate. 

The CAPEC-233 Privilege Escalation sample precisely describes the assault methodology, the place professional administrative entry serves as a stepping stone to finish system management.

Technical evaluation reveals that the vulnerability stems from insufficient enter validation inside the internet administration interface, permitting specifically crafted instructions to bypass safety controls and execute with elevated privileges. 

The command injection happens when user-supplied enter is processed with out correct sanitization, enabling attackers to append malicious instructions that the system interprets and executes as a part of professional administrative operations.

Threat FactorsDetailsAffected ProductsPAN-OS 10.1 (all variations), PAN-OS 10.2 (variations 10.2.0 by way of 10.2.7), and PAN-OS 11.0 (variations 11.0.0 by way of 11.0.2)ImpactPrivilege escalationExploit Prerequisites1. Community entry to administration interface 2. Legitimate admin credentials 3. Publicity of administration interface to untrusted networksCVSS 3.1 Score6.1 (Medium)

The vulnerability impacts particular variations of PAN-OS, with essentially the most vital publicity affecting PAN-OS 10.1 (all variations), PAN-OS 10.2 (variations 10.2.0 by way of 10.2.7), and PAN-OS 11.0 (variations 11.0.0 by way of 11.0.2). 

Importantly, PAN-OS 11.1, PAN-OS 11.2, Cloud NGFW, and Prisma Entry stay unaffected by this vulnerability, offering aid for organizations utilizing these newer platforms.

Organizations with internet-facing administration interfaces face the very best danger, because the vulnerability allows distant exploitation by way of the community assault vector. 

Mitigation Methods 

Rapid remediation requires upgrading to patched variations, particularly PAN-OS 11.0.3 or later for the 11.0 department, and PAN-OS 10.2.8 or later for the ten.2 department.

Organizations operating PAN-OS 10.1 should improve to both 10.2.8 or 11.0.3 or later variations, as no direct patch exists for the ten.1 department. Legacy installations on unsupported variations require fast migration to supported, patched releases.

Important deployment pointers emphasize limiting administration interface entry to trusted inner IP addresses solely. 

This mitigation technique dramatically reduces the assault floor by stopping exterior menace actors from reaching susceptible administration interfaces. 

Organizations ought to implement bounce field architectures the place administrative entry happens solely by way of designated programs with fastidiously managed community entry.

Community segmentation, entry management lists, and VPN-based administrative entry present layered safety approaches that complement the first remediation technique of upgrading to patched variations.

Automate menace response with ANY.RUN’s TI Feeds—Enrich alerts and block malicious IPs throughout all endpoints -> Request full entry

Cyber Security News Tags:Actions, Admin, Alto, Enables, Execute, Networks, Palo, PANOS, Root, User, Vulnerability

Post navigation

Previous Post: Multiple GitLab Vulnerabilities Allow Attackers to Achieve Complete Account Takeover
Next Post: OpenPGP.js Vulnerability Let Attackers Spoof Message Signature Verification

Related Posts

Hackers Mimic IT Teams to Exploit Microsoft Teams Request to Gain System Remote Access Cyber Security News
Threat Actors Abuse AI Website Creation App to Deliver Malware Cyber Security News
OpenVPN Driver Vulnerability Let Attackers to Crash Windows Systems Cyber Security News
New Zip Slip Vulnerability Allows Attackers to Manipulate ZIP Files During Decompression Cyber Security News
A New Tool that Automates GitHub Device Code Phishing Attack Cyber Security News
Critical Open Source Easyjson Library Under Full Control of Russian Company Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Choosing the Right Tool for Network Penetration Testing
  • FBI Warns of UNC6040 and UNC6395 Targeting Salesforce Platforms in Data Theft Attacks
  • EvilAI as AI-enhanced Tools to Exfiltrate Sensitive Browser Data and Evade Detections
  • New Malvertising Campaign Leverages GitHub Repository to Deliver Malware
  • Buterat Backdoor Attacking Enterprises to Establish Persistence and Control Endpoints

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Choosing the Right Tool for Network Penetration Testing
  • FBI Warns of UNC6040 and UNC6395 Targeting Salesforce Platforms in Data Theft Attacks
  • EvilAI as AI-enhanced Tools to Exfiltrate Sensitive Browser Data and Evade Detections
  • New Malvertising Campaign Leverages GitHub Repository to Deliver Malware
  • Buterat Backdoor Attacking Enterprises to Establish Persistence and Control Endpoints

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News