First published: Wed Apr 09 2025(Updated: )
A denial-of-service (DoS) vulnerability in the Simple Certificate Enrollment Protocol (SCEP) authentication feature of Palo Alto Networks PAN-OS® software enables an unauthenticated attacker to initiate system reboots using a maliciously crafted packet. Repeated attempts to initiate a reboot causes the firewall to enter maintenance mode. Cloud NGFW is not affected by this vulnerability. Prisma® Access software is proactively patched and protected from this issue.
Affected Software | Affected Version | How to fix |
---|---|---|
Palo Alto PAN-OS | <11.2.3=11.2.0<11.1.5=11.1.0<11.0.6=11.0.0<10.2.11=10.2.0<10.1.14-h11=10.1.0 | 11.2.3 11.1.5 11.0.6 10.2.11 10.1.14-h11 |
If you are not using SCEP, you can disable it to mitigate this risk by running the following command in your PAN-OS command-line interface (CLI): > debug sslmgr set disable-scep-auth-cookie yes CAUTION: This workaround is effective only until the next reboot, after which you must rerun this command to stay protected.
VERSION MINOR VERSION SUGGESTED SOLUTION PAN-OS 11.2 11.2.0 through 11.2.2 Upgrade to 11.2.3 or later PAN-OS 11.1 11.1.0 through 11.1.4 Upgrade to 11.1.5 or later PAN-OS 11.0 11.0.0 through 11.0.5 Upgrade to 11.0.6 or later PAN-OS 10.2 10.2.0 through 10.2.10 Upgrade to 10.2.11 or later PAN-OS 10.1 10.1.0 through 10.1.14 Upgrade to 10.1.14-h11 or later All other older Upgrade to a supported fixed version. unsupported PAN-OS versions PAN-OS 11.0 is EoL. We listed it in this section for completeness because we added a patch for PAN-OS 11.0 before it reached EoL. If you are running PAN-OS 11.0 in any of your firewalls, we strongly recommend that you upgrade to a fixed supported version. We proactively initiated the upgrade through Prisma Access March 21, 2025, to cover all tenants.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-0128 is classified as a denial-of-service (DoS) vulnerability.
To fix CVE-2025-0128, you should update your Palo Alto Networks PAN-OS to a version that is not affected by this vulnerability.
Any user running affected versions of Palo Alto Networks PAN-OS, including versions up to 11.2.3, may be susceptible to CVE-2025-0128.
CVE-2025-0128 allows unauthenticated attackers to send malicious packets to trigger system reboots.
The overall impact of CVE-2025-0128 can result in system downtime due to repeated unauthorized reboots.