CVE-2025-4231
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-06-13

Last updated on: 2025-10-22

Assigner: Palo Alto Networks, Inc.

Description
A command injection vulnerability in Palo Alto Networks PAN-OS® enables an authenticated administrative user to perform actions as the root user. The attacker must have network access to the management web interface and successfully authenticate to exploit this issue. Cloud NGFW and Prisma Access are not impacted by this vulnerability.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-06-13
Last Modified
2025-10-22
Generated
2026-05-06
AI Q&A
2025-06-13
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
paloaltonetworks pan-os From 11.2.0 (inc) to 11.2.8 (inc)
paloaltonetworks pan-os From 11.2.0 (inc) to 11.2.8 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-77 The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-4231 is a command injection vulnerability in Palo Alto Networks PAN-OS management web interface. It allows an authenticated administrative user with network access to execute commands as the root user, effectively escalating their privileges. The vulnerability affects PAN-OS versions prior to 11.0.3 and 10.2.8, specifically versions 11.0.0 through 11.0.2 and 10.2.0 through 10.2.7. Exploitation requires no user interaction and has low attack complexity, but the attacker must have administrative credentials and network access to the management interface. [1]


How can this vulnerability impact me? :

This vulnerability can have a high impact as it allows an authenticated administrative user to execute commands as the root user, potentially compromising the confidentiality, integrity, and availability of the affected system. If the management interface is exposed to untrusted networks or the internet, the risk is higher. An attacker exploiting this vulnerability could take full control of the device, leading to unauthorized changes, data breaches, or service disruptions. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by identifying if your PAN-OS management interface is exposed to untrusted networks or the internet, especially on ports 443 or 4443. Palo Alto Networks provides asset scanning tools to identify internet-facing management interfaces tagged with 'PAN-SA-2024-0015' for remediation. Specific commands are not provided in the resources, but using these scanning tools and checking for PAN-OS versions prior to 11.0.3 or 10.2.8 can help detect vulnerable systems. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include upgrading PAN-OS to fixed versions: 11.0.3 or later for 11.0.x users, 10.2.8 or later for 10.2.x users, or upgrading from 10.1.x to a supported fixed version. Additionally, restrict management interface access to trusted internal IP addresses or through a jump box to minimize exposure. Follow Palo Alto Networks’ administrative access best practices to secure management interfaces. Avoid exposing the management interface to untrusted networks or the internet. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart