Paloaltonetworks PAN-OS vulnerabilities
209 known vulnerabilities affecting paloaltonetworks/pan-os.
Total CVEs
209
CISA KEV
12
actively exploited
Public exploits
14
Exploited in wild
9
Severity breakdown
CRITICAL33HIGH75MEDIUM93LOW8
Vulnerabilities
Page 1 of 11
CVE-2026-0227MEDIUMCVSS 6.6≥ 10.1.0, < 10.1.14≥ 10.2.0, < 10.2.7+25 more2026-01-15
CVE-2026-0227 [MEDIUM] CWE-754 CVE-2026-0227: A vulnerability in Palo Alto Networks PAN-OS software enables an unauthenticated attacker to cause a
A vulnerability in Palo Alto Networks PAN-OS software enables an unauthenticated attacker to cause a denial of service (DoS) to the firewall. Repeated attempts to trigger this issue results in the firewall entering into maintenance mode.
nvd
CVE-2025-4615MEDIUMCVSS 5.5≥ 10.2.0, < 10.2.17≥ 11.1.0, < 11.1.11+1 more2025-10-09
CVE-2025-4615 [MEDIUM] CWE-83 CVE-2025-4615: An improper input neutralization vulnerability in the management web interface of the Palo Alto Netw
An improper input neutralization vulnerability in the management web interface of the Palo Alto Networks PAN-OS® software enables an authenticated administrator to bypass system restrictions and execute arbitrary commands.
The security risk posed by this issue is significantly minimized when CLI access is restricted to a limited group of administrator
nvd
CVE-2025-4614MEDIUMCVSS 4.8≥ 10.2.0, < 10.2.17≥ 11.1.0, < 11.1.6+2 more2025-10-09
CVE-2025-4614 [MEDIUM] CWE-497 CVE-2025-4614: An information disclosure vulnerability in Palo Alto Networks PAN-OS® software enables an authentica
An information disclosure vulnerability in Palo Alto Networks PAN-OS® software enables an authenticated administrator to view session tokens of users authenticated to the firewall web UI. This may allow impersonation of users whose session tokens are leaked.
The security risk posed by this issue is significantly minimized when CLI access is restricte
nvd
CVE-2025-4231HIGHCVSS 8.6≥ 10.2.0, < 10.2.8≥ 11.0.0, < 11.0.32025-06-13
CVE-2025-4231 [HIGH] CWE-77 CVE-2025-4231: A command injection vulnerability in Palo Alto Networks PAN-OS® enables an authenticated administrat
A command injection vulnerability in Palo Alto Networks PAN-OS® enables an authenticated administrative user to perform actions as the root user.
The attacker must have network access to the management web interface and successfully authenticate to exploit this issue.
Cloud NGFW and Prisma Access are not impacted by this vulnerability.
nvd
CVE-2025-0130HIGHCVSS 8.2≥ 11.1.0, < 11.1.6≥ 11.2.0, < 11.2.5+1 more2025-05-14
CVE-2025-0130 [HIGH] CWE-754 CVE-2025-0130: A missing exception check in Palo Alto Networks PAN-OS® software with the web proxy feature enabled
A missing exception check in Palo Alto Networks PAN-OS® software with the web proxy feature enabled allows an unauthenticated attacker to send a burst of maliciously crafted packets that causes the firewall to become unresponsive and eventually reboot. Repeated successful attempts to trigger this condition will cause the firewall to enter maintenance mod
nvd
CVE-2025-0124MEDIUMCVSS 5.1≥ 10.1.0, < 10.1.14≥ 10.2.0, < 10.2.10+4 more2025-04-11
CVE-2025-0124 [MEDIUM] CWE-73 CVE-2025-0124: An authenticated file deletion vulnerability in the Palo Alto Networks PAN-OS® software enables an a
An authenticated file deletion vulnerability in the Palo Alto Networks PAN-OS® software enables an authenticated attacker with network access to the management web interface to delete certain files as the “nobody” user; this includes limited logs and configuration files but does not include system files.
The attacker must have network access to the ma
nvd
CVE-2025-0114HIGHCVSS 8.2≥ 10.1.0, < 10.1.14≥ 10.2.0, < 10.2.5+2 more2025-03-12
CVE-2025-0114 [HIGH] CWE-400 CVE-2025-0114: A Denial of Service (DoS) vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS so
A Denial of Service (DoS) vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software enables an unauthenticated attacker to render the service unavailable by sending a large number of specially crafted packets over a period of time. This issue affects both the GlobalProtect portal and the GlobalProtect gateway.
This issue does not
nvd
CVE-2025-0111HIGHCVSS 7.1KEV≥ 10.1.0, < 10.1.14≥ 10.2.0, < 10.2.7+11 more2025-02-12
CVE-2025-0111 [HIGH] CWE-73 CVE-2025-0111: An authenticated file read vulnerability in the Palo Alto Networks PAN-OS software enables an authen
An authenticated file read vulnerability in the Palo Alto Networks PAN-OS software enables an authenticated attacker with network access to the management web interface to read files on the PAN-OS filesystem that are readable by the “nobody” user.
You can greatly reduce the risk of this issue by restricting access to the management web interface to only
nvd
CVE-2025-0108HIGHCVSS 8.8KEVPoC≥ 10.1.0, < 10.1.14≥ 10.2.0, < 10.2.7+16 more2025-02-12
CVE-2025-0108 [HIGH] CWE-306 CVE-2025-0108: An authentication bypass in the Palo Alto Networks PAN-OS software enables an unauthenticated attack
An authentication bypass in the Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to bypass the authentication otherwise required by the PAN-OS management web interface and invoke certain PHP scripts. While invoking these PHP scripts does not enable remote code execution, it can ne
nvd
CVE-2024-3393HIGHCVSS 8.7KEV≥ 11.1.0, ≤ 11.1.1≥ 11.2.0, < 11.2.3+10 more2024-12-27
CVE-2024-3393 [HIGH] CWE-754 CVE-2024-3393: A Denial of Service vulnerability in the DNS Security feature of Palo Alto Networks PAN-OS software
A Denial of Service vulnerability in the DNS Security feature of Palo Alto Networks PAN-OS software allows an unauthenticated attacker to send a malicious packet through the data plane of the firewall that reboots the firewall. Repeated attempts to trigger this condition will cause the firewall to enter maintenance mode.
nvd
CVE-2024-0012CRITICALCVSS 9.3KEVPoCv10.2.0v10.2.1+29 more2024-11-18
CVE-2024-0012 [CRITICAL] CWE-306 CVE-2024-0012: An authentication bypass in Palo Alto Networks PAN-OS software enables an unauthenticated attacker w
An authentication bypass in Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to gain PAN-OS administrator privileges to perform administrative actions, tamper with the configuration, or exploit other authenticated privilege escalation vulnerabilities like CVE-2024-9474 https:/
nvd
CVE-2024-9474MEDIUMCVSS 6.9KEVPoC≥ 10.1.0, < 10.1.14≥ 10.2.0, < 10.2.12+8 more2024-11-18
CVE-2024-9474 [MEDIUM] CWE-78 CVE-2024-9474: A privilege escalation vulnerability in Palo Alto Networks PAN-OS software allows a PAN-OS administr
A privilege escalation vulnerability in Palo Alto Networks PAN-OS software allows a PAN-OS administrator with access to the management web interface to perform actions on the firewall with root privileges.
Cloud NGFW and Prisma Access are not impacted by this vulnerability.
nvd
CVE-2024-2551HIGHCVSS 8.7≥ 10.1.0, < 10.1.14≥ 10.2.0, < 10.2.4+2 more2024-11-14
CVE-2024-2551 [HIGH] CWE-476 CVE-2024-2551: A null pointer dereference vulnerability in Palo Alto Networks PAN-OS software enables an unauthenti
A null pointer dereference vulnerability in Palo Alto Networks PAN-OS software enables an unauthenticated attacker to stop a core system service on the firewall by sending a crafted packet through the data plane that causes a denial of service (DoS) condition. Repeated attempts to trigger this condition result in the firewall entering maintenance mode.
nvd
CVE-2024-2550HIGHCVSS 8.7≥ 10.2.0, < 10.2.7≥ 11.0.0, < 11.0.6+6 more2024-11-14
CVE-2024-2550 [HIGH] CWE-476 CVE-2024-2550: A null pointer dereference vulnerability in the GlobalProtect gateway in Palo Alto Networks PAN-OS s
A null pointer dereference vulnerability in the GlobalProtect gateway in Palo Alto Networks PAN-OS software enables an unauthenticated attacker to stop the GlobalProtect service on the firewall by sending a specially crafted packet that causes a denial of service (DoS) condition. Repeated attempts to trigger this condition result in the firewall enterin
nvd
CVE-2024-5919MEDIUMCVSS 5.1≥ 10.1.0, < 10.1.10≥ 10.2.0, < 10.2.5+1 more2024-11-14
CVE-2024-5919 [MEDIUM] CWE-611 CVE-2024-5919: A blind XML External Entities (XXE) injection vulnerability in the Palo Alto Networks PAN-OS softwar
A blind XML External Entities (XXE) injection vulnerability in the Palo Alto Networks PAN-OS software enables an authenticated attacker to exfiltrate arbitrary files from firewalls to an attacker controlled server. This attack requires network access to the firewall management interface.
nvd
CVE-2024-2552MEDIUMCVSS 6.8≥ 10.2.0, < 10.2.7≥ 11.0.0, < 11.0.6+8 more2024-11-14
CVE-2024-2552 [MEDIUM] CWE-22 CVE-2024-2552: A command injection vulnerability in Palo Alto Networks PAN-OS software enables an authenticated adm
A command injection vulnerability in Palo Alto Networks PAN-OS software enables an authenticated administrator to bypass system restrictions in the management plane and delete files on the firewall.
nvd
CVE-2024-5918MEDIUMCVSS 5.3≥ 10.1.0, < 10.1.11≥ 10.2.0, ≤ 10.2.4+2 more2024-11-14
CVE-2024-5918 [MEDIUM] CWE-295 CVE-2024-5918: An improper certificate validation vulnerability in Palo Alto Networks PAN-OS software enables an au
An improper certificate validation vulnerability in Palo Alto Networks PAN-OS software enables an authorized user with a specially crafted client certificate to connect to an impacted GlobalProtect portal or GlobalProtect gateway as a different legitimate user. This attack is possible only if you "Allow Authentication with User Credentials OR Client C
nvd
CVE-2024-5920MEDIUMCVSS 4.6≥ 10.1.0, < 10.1.14≥ 10.2.0, < 10.2.11+2 more2024-11-14
CVE-2024-5920 [MEDIUM] CWE-79 CVE-2024-5920: A cross-site scripting (XSS) vulnerability in Palo Alto Networks PAN-OS software enables an authenti
A cross-site scripting (XSS) vulnerability in Palo Alto Networks PAN-OS software enables an authenticated read-write Panorama administrator to push a specially crafted configuration to a PAN-OS node. This enables impersonation of a legitimate PAN-OS administrator who can perform restricted actions on the PAN-OS node after the execution of JavaScript in
nvd
CVE-2024-5917LOWCVSS 2.1≥ 10.1.0, < 10.1.7≥ 10.2.0, < 10.2.22024-11-14
CVE-2024-5917 [LOW] CWE-918 CVE-2024-5917: A server-side request forgery in PAN-OS software enables an authenticated attacker with administrati
A server-side request forgery in PAN-OS software enables an authenticated attacker with administrative privileges to use the administrative web interface as a proxy, which enables the attacker to view internal network resources not otherwise accessible.
nvd
CVE-2024-9468HIGHCVSS 8.2≥ 10.2.0, < 10.2.4≥ 10.2.5, < 10.2.7+9 more2024-10-09
CVE-2024-9468 [HIGH] CWE-787 CVE-2024-9468: A memory corruption vulnerability in Palo Alto Networks PAN-OS software allows an unauthenticated at
A memory corruption vulnerability in Palo Alto Networks PAN-OS software allows an unauthenticated attacker to crash PAN-OS due to a crafted packet through the data plane, resulting in a denial of service (DoS) condition. Repeated attempts to trigger this condition will result in PAN-OS entering maintenance mode.
nvd
1 / 11Next →