CVE-2025-4614
BaseFortify
Publication date: 2025-10-09
Last updated on: 2026-02-06
Assigner: Palo Alto Networks, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| paloaltonetworks | pan-os | From 11.2.0 (inc) to 11.2.8 (inc) |
| paloaltonetworks | pan-os | From 11.2.0 (inc) to 11.2.8 (inc) |
| paloaltonetworks | pan-os | From 11.2.0 (inc) to 11.2.8 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-497 | The product does not properly prevent sensitive system-level information from being accessed by unauthorized actors who do not have the same level of access to the underlying system as the product does. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an information disclosure issue in Palo Alto Networks PAN-OS software that allows an authenticated administrator to view session tokens of users logged into the firewall web UI. With access to these session tokens, the administrator could potentially impersonate those users.
How can this vulnerability impact me? :
The vulnerability could allow an authenticated administrator to impersonate other users by using their session tokens, potentially leading to unauthorized actions or access within the firewall web UI. The risk is reduced if CLI access is limited to a small group of administrators.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, restrict CLI access to a limited group of administrators to significantly minimize the security risk posed by the information disclosure vulnerability.