PAN-OS under attack: urgent patch for active exploitation

Published on May 07, 2026 | Translated from Spanish

Palo Alto Networks has confirmed active exploitation of a critical vulnerability in its PAN-OS operating system. The flaw allows attackers to remotely execute code without authentication, compromising firewalls and security devices. The company urges immediate application of available patches to prevent intrusions.

Illustration of a digital firewall with bright red cracks, on a dark background, while malicious code flows in from multiple points.

Technical details of the flaw and recommended mitigation 🔧

The vulnerability, identified as CVE-2025-0108, resides in the web management component of PAN-OS. It affects specific versions of PAN-OS 10.2, 11.0, and 11.1. Attackers can send malicious requests to execute arbitrary commands. Palo Alto recommends updating to the fixed versions: PAN-OS 10.2.12-h1, 11.0.6-h1, and 11.1.4-h1, or applying workarounds if patching is not immediately possible.

The firewall that becomes an entry door 🚪

It turns out that the system designed to protect your network can now be the key entry point for the bad guys. It's like hiring a security guard who is actually a pickpocket. If your PAN-OS firewall is not patched, it not only fails to protect you but invites attackers in. Palo Alto has already given you the solution; you just need to stop being lazy and update.