CVE-2025-0109 - Palo Alto Networks PAN-OS Unauthenticated File Deletion Vulnerability

CVE ID : CVE-2025-0109 Published : Feb. 12, 2025, 9:15 p.m. | 29 minutes ago Description : An unauthenticated file deletion vulnerability in the Palo Alto Networks PAN-OS management web interface enables an unauthenticated attacker with network access to the management web interface to delete certain files as the “nobody” user; this includes limited logs and configuration files but does not include system files. You can greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended best practices deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 . This issue does not affect Cloud NGFW or Prisma Access software. Severity: 0.0 | NA Visit the link for more details, such as CVSS details, affected products, timeline, and more...

Feb 12, 2025 - 22:45
 0  0
CVE-2025-0109 - Palo Alto Networks PAN-OS Unauthenticated File Deletion Vulnerability
CVE ID : CVE-2025-0109
Published : Feb. 12, 2025, 9:15 p.m. | 29 minutes ago
Description : An unauthenticated file deletion vulnerability in the Palo Alto Networks PAN-OS management web interface enables an unauthenticated attacker with network access to the management web interface to delete certain files as the “nobody” user; this includes limited logs and configuration files but does not include system files. You can greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended best practices deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 . This issue does not affect Cloud NGFW or Prisma Access software.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...