CVE-2025-0111

An authenticated file read vulnerability in the Palo Alto Networks PAN-OS software enables an authenticated attacker with network access to the management web interface to read files on the PAN-OS filesystem that are readable by the nobody user.

You can greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended  best practices deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 .



This issue does not affect Cloud NGFW or Prisma Access software.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.5 MEDIUM
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
palo_altoCNA
---
---
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 86%
VendorProductVersion
paloaltonetworkspan-os
10.1.0 ≤
𝑥
< 10.1.14
paloaltonetworkspan-os
10.2.0 ≤
𝑥
< 10.2.7
paloaltonetworkspan-os
10.2.10 ≤
𝑥
< 10.2.12
paloaltonetworkspan-os
11.0.0 ≤
𝑥
< 11.1.6
paloaltonetworkspan-os
11.2.0 ≤
𝑥
< 11.2.4
paloaltonetworkspan-os
10.1.14
paloaltonetworkspan-os
10.1.14:h2
paloaltonetworkspan-os
10.1.14:h4
paloaltonetworkspan-os
10.1.14:h6
paloaltonetworkspan-os
10.1.14:h8
paloaltonetworkspan-os
10.2.7
paloaltonetworkspan-os
10.2.7:h1
paloaltonetworkspan-os
10.2.7:h12
paloaltonetworkspan-os
10.2.7:h16
paloaltonetworkspan-os
10.2.7:h18
paloaltonetworkspan-os
10.2.7:h19
paloaltonetworkspan-os
10.2.7:h21
paloaltonetworkspan-os
10.2.7:h3
paloaltonetworkspan-os
10.2.7:h6
paloaltonetworkspan-os
10.2.7:h8
paloaltonetworkspan-os
10.2.8
paloaltonetworkspan-os
10.2.8:h10
paloaltonetworkspan-os
10.2.8:h13
paloaltonetworkspan-os
10.2.8:h15
paloaltonetworkspan-os
10.2.8:h18
paloaltonetworkspan-os
10.2.8:h19
paloaltonetworkspan-os
10.2.8:h3
paloaltonetworkspan-os
10.2.8:h4
paloaltonetworkspan-os
10.2.9
paloaltonetworkspan-os
10.2.9:h1
paloaltonetworkspan-os
10.2.9:h11
paloaltonetworkspan-os
10.2.9:h14
paloaltonetworkspan-os
10.2.9:h16
paloaltonetworkspan-os
10.2.9:h18
paloaltonetworkspan-os
10.2.9:h19
paloaltonetworkspan-os
10.2.9:h9
paloaltonetworkspan-os
10.2.12
paloaltonetworkspan-os
10.2.12:h1
paloaltonetworkspan-os
10.2.12:h2
paloaltonetworkspan-os
10.2.12:h3
paloaltonetworkspan-os
10.2.12:h4
paloaltonetworkspan-os
10.2.13
paloaltonetworkspan-os
10.2.13:h1
paloaltonetworkspan-os
10.2.13:h2
paloaltonetworkspan-os
11.1.6
paloaltonetworkspan-os
11.2.4
paloaltonetworkspan-os
11.2.4:h1
paloaltonetworkspan-os
11.2.4:h2
𝑥
= Vulnerable software versions