Palo Alto 安全中心 04月10日 00:21
CVE-2025-0122 Prisma SD-WAN: Denial of Service (DoS) Vulnerability Through Burst of Crafted Packets (Severity: MEDIUM)
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

Palo Alto Networks Prisma SD-WAN 产品中存在一个拒绝服务 (DoS) 漏洞 (CVE-2025-0122)。该漏洞允许网络中未经身份验证的攻击者通过向 Prisma SD-WAN ION 设备发送大量精心构造的数据包,从而中断设备的数据包处理能力。Palo Alto Networks 建议使用 Prisma SD-WAN 6.2 版本的用户升级到 6.3.4、6.4.2 或 6.5.1 版本,以修复此问题。该漏洞的严重程度被评为中等,目前没有已知的解决方法。

🛡️ 漏洞描述:Palo Alto Networks Prisma SD-WAN ION 设备存在拒绝服务 (DoS) 漏洞,攻击者通过发送大量精心构造的数据包来攻击该设备。

🎯 攻击条件:攻击者无需身份验证,且必须位于 Prisma SD-WAN ION 设备所在的相邻网络中。

⚠️ 影响范围:该漏洞会中断设备的数据包处理能力。

💡 修复建议:Palo Alto Networks 建议使用 Prisma SD-WAN 6.2 版本的用户升级到 6.3.4、6.4.2 或 6.5.1 版本。对于其他版本,建议升级到最新版本。

🚨 风险评估:该漏洞的严重程度被评为中等,目前没有已知的解决方法,Palo Alto Networks 尚未发现该漏洞被恶意利用的迹象。

Palo Alto Networks Security Advisories

/

CVE-2025-0122

CVE-2025-0122 Prisma SD-WAN: Denial of Service (DoS) Vulnerability Through Burst of Crafted Packets

Exploit MaturityUNREPORTED

Response EffortLOW

RecoveryAUTOMATIC

Value DensityDIFFUSE

Attack VectorADJACENT

Attack ComplexityLOW

Attack RequirementsNONE

AutomatableYES

User InteractionNONE

Product ConfidentialityNONE

Product IntegrityNONE

Product AvailabilityHIGH

Privileges RequiredNONE

Subsequent ConfidentialityNONE

Subsequent IntegrityNONE

Subsequent AvailabilityNONE

Description

A denial-of-service (DoS) vulnerability in Palo Alto Networks Prisma® SD-WAN ION devices enables an unauthenticated attacker in a network adjacent to a Prisma SD-WAN ION device to disrupt the packet processing capabilities of the device by sending a burst of crafted packets to that device.

Product Status

We do not plan to fix this issue in Prisma SD-WAN 6.2. If you are using Prisma SD-WAN 6.2, we recommend that you upgrade to Prisma SD-WAN 6.3.4, Prisma SD-WAN 6.4.2, or Prisma SD-WAN 6.5.1.

Required Configuration for Exposure

No special configuration is needed to be vulnerable to this issue.

Severity:MEDIUM, Suggested Urgency:MODERATE

CVSS-BT:4.9 /CVSS-B:7.1 (CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/AU:Y/R:A/V:D/RE:L/U:Amber)

Exploitation Status

Palo Alto Networks is not aware of any malicious exploitation of this issue.

Weakness Type and Impact

CWE-770 Allocation of Resources Without Limits or Throttling

CAPEC-482 TCP Flood

Solution

VersionSuggested Solution
Prisma SD-WAN 6.5Upgrade to Prisma SD-WAN 6.5.1 or later
Prisma SD-WAN 6.4
Upgrade to Prisma SD-WAN 6.4.2 or later
Prisma SD-WAN 6.3Upgrade to Prisma SD-WAN 6.3.4 or later
Prisma SD-WAN 6.2Upgrade to Prisma SD-WAN 6.3.4 or later
Prisma SD-WAN 6.1Upgrade to Prisma SD-WAN 6.1.10 or later

Workarounds and Mitigations

There are no known workarounds for this issue.

Acknowledgments

Palo Alto Networks thanks Vajrapu Venkata Sarat Kumar of Palo Alto Networks for discovering and reporting the issue.

CPEs

cpe:2.3:undefined:paloaltonetworks:prisma_sd-wan:6.5.0:-:*:*:*:*:*:*

cpe:2.3:undefined:paloaltonetworks:prisma_sd-wan:6.4.0:-:*:*:*:*:*:*

cpe:2.3:undefined:paloaltonetworks:prisma_sd-wan:6.4.1:-:*:*:*:*:*:*

cpe:2.3:undefined:paloaltonetworks:prisma_sd-wan:6.3.0:-:*:*:*:*:*:*

cpe:2.3:undefined:paloaltonetworks:prisma_sd-wan:6.3.1:-:*:*:*:*:*:*

cpe:2.3:undefined:paloaltonetworks:prisma_sd-wan:6.3.2:-:*:*:*:*:*:*

cpe:2.3:undefined:paloaltonetworks:prisma_sd-wan:6.3.3:-:*:*:*:*:*:*

cpe:2.3:undefined:paloaltonetworks:prisma_sd-wan:6.1.0:-:*:*:*:*:*:*

cpe:2.3:undefined:paloaltonetworks:prisma_sd-wan:6.1.1:-:*:*:*:*:*:*

cpe:2.3:undefined:paloaltonetworks:prisma_sd-wan:6.1.2:-:*:*:*:*:*:*

cpe:2.3:undefined:paloaltonetworks:prisma_sd-wan:6.1.3:-:*:*:*:*:*:*

cpe:2.3:undefined:paloaltonetworks:prisma_sd-wan:6.1.4:-:*:*:*:*:*:*

cpe:2.3:undefined:paloaltonetworks:prisma_sd-wan:6.1.5:-:*:*:*:*:*:*

cpe:2.3:undefined:paloaltonetworks:prisma_sd-wan:6.1.6:-:*:*:*:*:*:*

cpe:2.3:undefined:paloaltonetworks:prisma_sd-wan:6.1.7:-:*:*:*:*:*:*

cpe:2.3:undefined:paloaltonetworks:prisma_sd-wan:6.1.8:-:*:*:*:*:*:*

cpe:2.3:undefined:paloaltonetworks:prisma_sd-wan:6.1.9:-:*:*:*:*:*:*

Timeline

Initial Publication

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

Palo Alto Networks Prisma SD-WAN DoS漏洞 网络安全 漏洞修复
相关文章