Recently patched PAN OS firewall bug actively exploited in the wild

Recently patched PAN OS firewall bug actively exploited in the wild

Palo Alto Networks has confirmed that a recently patched critical vulnerability in its PAN-OS firewall, tracked as CVE-2025-0108, is being actively exploited by threat actors. The vulnerability, which was disclosed on February 12, allows unauthenticated attackers to bypass authentication mechanisms, granting them access to the firewall’s management interface.

“Palo Alto Networks has observed exploit attempts chaining CVE-2025-0108 with CVE-2024-9474 and CVE-2025-0111 on unpatched and unsecured PAN-OS web management interfaces,” the company noted in an updated advisory.

Security researchers at the threat intelligence firm GreyNoise reported the first observed exploitation attempts on February 13. While the exact nature of the exploitation remains unclear, GreyNoise has classified the activity as “malicious.” By Tuesday, February 18, GreyNoise had detected exploit attempts originating from nearly 30 unique IP addresses.

The US Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2025-0108 and another flaw impacting SonicWall SonicOS SSLVPN (CVE-2024-53704) to its Known Exploited Vulnerabilities (KEV) catalog.

Back to the list

Latest Posts

UAT-5918 info-stealing campaign targets critical infrastructure entities in Taiwan

UAT-5918 info-stealing campaign targets critical infrastructure entities in Taiwan

The tactics and tools employed by UAT-5918 overlap with other state-sponsored threat groups, such as Volt Typhoon, Flex Typhoon, and Earth Estries.
20 March 2025
New supply chain attack allows to inject malicious code via AI code editors

New supply chain attack allows to inject malicious code via AI code editors

By exploiting hidden unicode characters and employing advanced evasion techniques, attackers can subtly alter the behavior of AI models.
19 March 2025
Russian disinformation actors employ new tactics to maintain influence

Russian disinformation actors employ new tactics to maintain influence

Rather than immediately deploying newly registered domains, many threat actors now secure domain names months in advance.
19 March 2025