First published: Wed Mar 12 2025(Updated: )
A Denial of Service (DoS) vulnerability in Palo Alto Networks PAN-OS software causes the firewall to unexpectedly reboot when processing a specially crafted LLDP frame sent by an unauthenticated adjacent attacker. Repeated attempts to initiate this condition causes the firewall to enter maintenance mode. This issue does not apply to Cloud NGFWs or Prisma Access software.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Palo Alto PAN-OS | <11.2.5=11.2.0<11.1.6-h6=11.1.0<10.2.10-h17=10.2.0<10.1.14-h11=10.1.0 | 11.2.5 11.1.8 11.1.6-h6 11.1.4-h17 10.2.14 10.2.13-h5 10.2.10-h17 10.1.14-h11 |
Palo Alto Networks Cloud NGFW | ||
Prisma |
Option 1: If you are not using LLDP, you should disable it to mitigate this issue by performing the following steps in your web interface: 1. Select Network > LLDP. 2. Open LLDP General settings. 3. Disable (uncheck) LLDP. Option 2: You can disable LLDP for your network interfaces by performing the following steps in your web interface: 1. Select Network > Interfaces and select the interface you wish to disable LLDP for. 2. Select Advanced > LLDP. 3. Disable (uncheck) LLDP. Option 3: If you are using LLDP only to advertise information about your PAN-OS device to other neighboring devices, you should set the LLDP mode to transmit-only for the profile used on your network interfaces by performing the following steps in your web interface: 1. Select Network > Network Profiles > LLDP Profile 2. Select the profile used with the interface 3. Set the "Mode" to "transmit-only".
VERSION MINOR VERSION SUGGESTED SOLUTION PAN-OS 11.2 11.2.0 through 11.2.4 Upgrade to 11.2.5 or later PAN-OS 11.1 11.1.0 through 11.1.7 Upgrade to 11.1.8 or later 11.1.0 through 11.1.6 Upgrade to 11.1.6-h6 or 11.1.8 or later 11.1.0 through 11.1.4 Upgrade to 11.1.4-h17 or 11.1.6-h6 or 11.1.8 or later PAN-OS 11.0 (EoL) Upgrade to a supported fixed version PAN-OS 10.2 10.2.13 Upgrade to 10.2.13-h5 or 10.2.14 or later 10.2.0 through 10.2.13 Upgrade to 10.2.14 or later 10.2.0 through 10.2.10 Upgrade to 10.2.10-h17 or 10.2.13-h5 or 10.2.14 or later PAN-OS 10.1 10.1.0 through 10.1.14 Upgrade to 10.1.14-h11 or later All other older Upgrade to a supported fixed version. unsupported PAN-OS versions
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-0116 is classified as a high severity Denial of Service (DoS) vulnerability.
CVE-2025-0116 affects multiple versions of PAN-OS including 11.2.5, 11.1.8, and 10.2.14 among others.
To mitigate CVE-2025-0116, it's recommended to upgrade to a patched version of PAN-OS.
CVE-2025-0116 can be exploited by an unauthenticated adjacent attacker sending specially crafted LLDP frames.
Exploiting CVE-2025-0116 can lead to unexpected reboots of the affected Palo Alto Networks firewall.