First published: Wed Mar 12 2025(Updated: )
A Denial of Service (DoS) vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software enables an unauthenticated attacker to render the service unavailable by sending a large number of specially crafted packets over a period of time. This issue affects both the GlobalProtect portal and the GlobalProtect gateway. This issue does not apply to Cloud NGFWs or Prisma Access software.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Palo Alto PAN-OS | <11.0.2=11.0.0<10.2.5=10.2.0<10.1.14-h11=10.1.0 | 11.0.2 10.2.5 10.1.14-h11 |
Palo Alto Networks Cloud NGFW | ||
Palo Alto Networks Prisma Access |
No workaround or mitigation is available.
VERSION MINOR VERSION SUGGESTED SOLUTION PAN-OS 11.0 11.0.0 through 11.0.1 Upgrade to 11.0.2 or later PAN-OS 10.2 10.2.0 through 10.2.4 Upgrade to 10.2.5 or later PAN-OS 10.1 10.1.0 through 10.1.14 Upgrade to 10.1.14-h11 or later All other older Upgrade to a supported fixed version. unsupported PAN-OS versions
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-0114 has been classified as a Denial of Service (DoS) vulnerability, allowing an unauthenticated attacker to disrupt service availability.
To remediate CVE-2025-0114, upgrade your PAN-OS to versions earlier than 11.0.2, 10.2.5, or 10.1.14-h11.
CVE-2025-0114 affects Palo Alto Networks PAN-OS, Cloud NGFW, and Prisma Access.
Yes, CVE-2025-0114 can be exploited remotely by sending specially crafted packets.
CVE-2025-0114 allows an attacker to render affected services unavailable, potentially disrupting network operations.