Start your free trial today.
Protect your organization with cutting-edge cybersecurity solutions designed for resilience and efficiency. Secure your digital assets with confidence.
Your Shield Against Threats
Unleash the Power of Cybersecurity
Boost Your Security, Enhance Your Business
We solve Your Cyber Challenges
Quick Links
Resources
Deepaegis Portals
2025 Deepaegis. All Rights Reserved.
A command injection vulnerability has been discovered in Palo Alto Networks PAN-OS® software, enabling an authenticated administrator to bypass system restrictions and execute arbitrary commands as the root user via the PAN-OS CLI. Cloud NGFW and Prisma® Access products are not affected by this vulnerability.
Successful exploitation allows an attacker with CLI access to gain root-level command execution privileges, which could lead to full system compromise, unauthorized system modifications, and service disruption.
PAN-OS Software
Remediation: Fix/Patch: (Not specified — refer to official advisory when available) Temporary Mitigation: Restrict CLI access to trusted administrators only. Monitor admin activities. Recommended Security Measures: Apply vendor patches or updates as soon as they are available. Implement strict role-based access controls. Detection Methods: Monitor for unusual CLI command patterns from administrative accounts. Audit logs for unauthorized administrative actions.
Awaiting official fix from Palo Alto Networks.
Restrict CLI access.
Limit CLI usage to trusted personnel, monitor CLI access.
Log analysis, anomaly detection in admin CLI usage.
6/11/2025
Not specified
No affected organizations specified
This document contains sensitive information. Unauthorized distribution is prohibited.