Palo Alto Networks has confirmed active exploitation of a critical vulnerability in its PAN-OS operating system. The flaw allows attackers to remotely execute code without authentication, compromising firewalls and security devices. The company urges immediate application of available patches to prevent intrusions.
Technical details of the flaw and recommended mitigation 🔧
The vulnerability, identified as CVE-2025-0108, resides in the web management component of PAN-OS. It affects specific versions of PAN-OS 10.2, 11.0, and 11.1. Attackers can send malicious requests to execute arbitrary commands. Palo Alto recommends updating to the fixed versions: PAN-OS 10.2.12-h1, 11.0.6-h1, and 11.1.4-h1, or applying workarounds if patching is not immediately possible.
The firewall that becomes an entry door 🚪
It turns out that the system designed to protect your network can now be the key entry point for the bad guys. It's like hiring a security guard who is actually a pickpocket. If your PAN-OS firewall is not patched, it not only fails to protect you but invites attackers in. Palo Alto has already given you the solution; you just need to stop being lazy and update.