Palo Alto Networks

Palo Alto Networks

Palo Alto Networks' PAN-OS software was found to contain a significant denial-of-service (DoS) vulnerability, labeled CVE-2025-0128, affecting several versions and potentially putting organizations at risk of service interruptions. Unauthenticated attackers could exploit this vulnerability to force system reboots and maintenance mode engagement, leading to service unavailability for those reliant on the company's firewall appliances. The security flaw, while rated 'MEDIUM' in severity due to a CVSS score of 6.6, has a high impact on availability, albeit not directly threatening data confidentiality or integrity. Security recommendations encourage immediate updates to patched software versions to prevent exploitation.

Source: https://cybersecuritynews.com/pan-os-firewall-dos-vulnerability/

TPRM report: https://scoringcyber.rankiteo.com/company/palo-alto-networks

"id": "pal707041025",
"linkid": "palo-alto-networks",
"type": "Vulnerability",
"date": "4/2025",
"severity": "60",
"impact": "1",
"explanation": "Attack without any consequences"
{'affected_entities': [{'industry': 'Cybersecurity',
                        'name': 'Palo Alto Networks',
                        'type': 'Organization'}],
 'attack_vector': 'Unauthenticated Exploitation',
 'description': "Palo Alto Networks' PAN-OS software was found to contain a "
                'significant denial-of-service (DoS) vulnerability, labeled '
                'CVE-2025-0128, affecting several versions and potentially '
                'putting organizations at risk of service interruptions. '
                'Unauthenticated attackers could exploit this vulnerability to '
                'force system reboots and maintenance mode engagement, leading '
                "to service unavailability for those reliant on the company's "
                "firewall appliances. The security flaw, while rated 'MEDIUM' "
                'in severity due to a CVSS score of 6.6, has a high impact on '
                'availability, albeit not directly threatening data '
                'confidentiality or integrity. Security recommendations '
                'encourage immediate updates to patched software versions to '
                'prevent exploitation.',
 'impact': {'downtime': 'System reboots and maintenance mode engagement',
            'operational_impact': 'Service unavailability',
            'systems_affected': 'Firewall appliances'},
 'recommendations': 'Immediate updates to patched software versions',
 'response': {'remediation_measures': 'Immediate updates to patched software '
                                      'versions'},
 'threat_actor': 'Unauthenticated Attackers',
 'title': 'Palo Alto Networks PAN-OS DoS Vulnerability',
 'type': 'Denial of Service (DoS)',
 'vulnerability_exploited': 'CVE-2025-0128'}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.