First published: Wed Feb 12 2025(Updated: )
An unauthenticated file deletion vulnerability in the Palo Alto Networks PAN-OS management web interface enables an unauthenticated attacker with network access to the management web interface to delete certain files as the “nobody” user; this includes limited logs and configuration files but does not include system files. You can greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended best practices deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 . This issue does not affect Cloud NGFW or Prisma Access software.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Palo Alto PAN-OS | ||
Palo Alto Networks Cloud NGFW | ||
Palo Alto PAN-OS | <10.1.14-h9=10.1.0<10.2.7-h24=10.2.0<11.1.6-h1=11.1.0<11.2.4-h4=11.2.0 | 10.1.14-h9 10.2.7-h24 10.2.8-h21 10.2.9-h21 10.2.12-h6 10.2.13-h3 10.2.10-h14 10.2.11-h12 11.1.6-h1 11.1.2-h18 11.2.4-h4 |
Palo Alto Networks Prisma Access |
Recommended mitigation—The vast majority of firewalls already follow Palo Alto Networks and industry best practices. However, if you have not already, we strongly recommend that you secure access to your management interface according to our best practices deployment guidelines (https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431). Specifically, you should restrict management interface access to only trusted internal IP addresses. Review information about how to secure management access to your Palo Alto Networks firewalls: * Palo Alto Networks LIVEcommunity article:https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 * Palo Alto Networks official and detailed technical documentation:https://docs.paloaltonetworks.com/best-practices/10-1/administrative-access-best-practices/administrative-access-best-practices/deploy-administrative-access-best-practices https://docs.paloaltonetworks.com/best-practices/10-1/administrative-access-best-practices/administrative-access-best-practices/deploy-administrative-access-best-practices
VERSION MINOR VERSION SUGGESTED SOLUTION PAN-OS 10.1 10.1.0 through 10.1.14 Upgrade to 10.1.14-h9 or later PAN-OS 10.2 10.2.0 through 10.2.13 Upgrade to 10.2.13-h3 or later 10.2.7 Upgrade to 10.2.7-h24 or 10.2.13-h3 or later 10.2.8 Upgrade to 10.2.8-h21 or 10.2.13-h3 or later 10.2.9 Upgrade to 10.2.9-h21 or 10.2.13-h3 or later 10.2.10 Upgrade to 10.2.10-h14 or 10.2.13-h3 or later 10.2.11 Upgrade to 10.2.11-h12 or 10.2.13-h3 or later 10.2.12 Upgrade to 10.2.12-h6 or 10.2.13-h3 or later PAN-OS 11.0 (EoL) Upgrade to a supported fixed version PAN-OS 11.1 11.1.0 through 11.1.6 Upgrade to 11.1.6-h1 or later 11.1.2 Upgrade to 11.1.2-h18 or 11.1.6-h1 or later PAN-OS 11.2 11.2.0 through 11.2.4 Upgrade to 11.2.4-h4 or later Note: PAN-OS 11.0 reached end of life (EoL) on November 17, 2024. No additional fixes are planned for this release.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-0109 is considered high severity due to its ability to allow unauthenticated attackers to delete files from the PAN-OS management interface.
To remediate CVE-2025-0109, upgrade to a patched version of PAN-OS such as 10.1.14-h9, 10.2.13-h3, 11.1.6-h1, or 11.2.4-h4.
CVE-2025-0109 affects users of Palo Alto Networks PAN-OS and related products like Prisma Access and Cloud NGFW.
CVE-2025-0109 allows the deletion of certain files, including limited logs and configuration files, by an unauthenticated attacker.
No, CVE-2025-0109 can be exploited by unauthenticated attackers with network access to the management web interface.