CVE-2025-0126Session Fixation in Palo Alto Networks Prisma Access

CWE-384Session Fixation4 documents4 sources
Severity
8.3HIGHNVD
EPSS
0.4%
top 41.98%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 11

Description

When configured using SAML, a session fixation vulnerability in the GlobalProtect™ login enables an attacker to impersonate a legitimate authorized user and perform actions as that GlobalProtect user. This requires the legitimate user to first click on a malicious link provided by the attacker. The SAML login for the PAN-OS® management interface is not affected. Additionally, this issue does not affect Cloud NGFW and all Prisma® Access instances are proactively patched.

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:H/SC:H/SI:N/SA:N

Affected Packages5 packages

CVEListV5palo_alto_networks/prisma_access10.2.010.2.4-h36+1
CVEListV5palo_alto_networks/pan-os11.2.011.2.3+4
Palo Altopaloalto/pan-os

🔴Vulnerability Details

2
CVEList
PAN-OS: Session Fixation Vulnerability in GlobalProtect SAML Login2025-04-11
GHSA
GHSA-6whh-pf24-fvfr: When configured using SAML, a session fixation vulnerability in the GlobalProtect™ login enables an attacker to impersonate a legitimate authorized us2025-04-11

📋Vendor Advisories

1
Palo Alto
PAN-OS: Session Fixation Vulnerability in GlobalProtect SAML Login
CVE-2025-0126 — Session Fixation in Palo | cvebase