CVE-2025-0130Improper Check for Unusual or Exceptional Conditions in Palo Alto Networks Pan-os

Severity
8.2HIGHNVD
EPSS
0.3%
top 46.47%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 14

Description

A missing exception check in Palo Alto Networks PAN-OS® software with the web proxy feature enabled allows an unauthenticated attacker to send a burst of maliciously crafted packets that causes the firewall to become unresponsive and eventually reboot. Repeated successful attempts to trigger this condition will cause the firewall to enter maintenance mode. This issue does not affect Cloud NGFW or Prisma Access.

CVSS vector

CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

Affected Packages5 packages

NVDpaloaltonetworks/pan-os11.1.011.1.6+2
CVEListV5palo_alto_networks/pan-os11.2.011.2.5+1
Palo Altopaloalto/pan-os

🔴Vulnerability Details

2
CVEList
PAN-OS: Firewall Denial-of-Service (DoS) in the Web-Proxy Feature via a Burst of Maliciously Crafted Packets2025-05-14
GHSA
GHSA-6whp-h3pf-v3x5: A missing exception check in Palo Alto Networks PAN-OS® software with the web proxy feature enabled allows an unauthenticated attacker to send a burst2025-05-14

📋Vendor Advisories

1
Palo Alto
PAN-OS: Firewall Denial-of-Service (DoS) in the Web-Proxy Feature via a Burst of Maliciously Crafted Packets2024-10-09
CVE-2025-0130 — Palo Alto Networks Pan-os vulnerability | cvebase