CVE-2025-0136Cleartext Transmission of Sensitive Info in Palo Alto Networks Pan-os

Severity
5.3MEDIUMNVD
EPSS
0.1%
top 74.30%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 14

Description

Using the AES-128-CCM algorithm for IPSec on certain Palo Alto Networks PAN-OS® firewalls (PA-7500, PA-5400, PA-5400f, PA-3400, PA-1600, PA-1400, and PA-400 Series) leads to unencrypted data transfer to devices that are connected to the PAN-OS firewall through IPSec. This issue does not affect Cloud NGFWs, Prisma® Access instances, or PAN-OS VM-Series firewalls. NOTE: The AES-128-CCM encryption algorithm is not recommended for use.

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

Affected Packages4 packages

CVEListV5palo_alto_networks/pan-os11.1.011.1.5+3
Palo Altopaloalto/pan-os

🔴Vulnerability Details

2
CVEList
PAN-OS: Unencrypted Data Transfer when using AES-128-CCM on Intel-based hardware devices2025-05-14
GHSA
GHSA-9wg5-mqr8-x4m3: Using the AES-128-CCM algorithm for IPSec on certain Palo Alto Networks PAN-OS® firewalls (PA-7500, PA-5400, PA-5400f, PA-3400, PA-1600, PA-1400, and2025-05-14

📋Vendor Advisories

1
Palo Alto
PAN-OS: Unencrypted Data Transfer when using AES-128-CCM on Intel-based hardware devices
CVE-2025-0136 — Palo Alto Networks Pan-os vulnerability | cvebase