Palo Alto 安全中心 05月15日 00:26
CVE-2025-0133 PAN-OS: Reflected Cross-Site Scripting (XSS) Vulnerability in GlobalProtect Gateway and Portal (Severity: LOW)
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

针对启用了Clientless VPN的GlobalProtect用户,由于Clientless VPN固有的风险,存在凭据被盗的潜在风险,可能对机密性产生有限的影响。如果未启用Clientless VPN,则GlobalProtect用户不受影响。该问题仅适用于启用了GlobalProtect网关或Portal的PAN-OS防火墙配置。建议用户启用威胁防御订阅,并开启Threat ID 510003和510004(在Applications and Threats内容版本8970中引入)来阻止攻击。此外,也可以选择禁用Clientless VPN。

⚠️ 影响范围:此安全问题主要影响启用了Clientless VPN的GlobalProtect用户,若未启用此功能,则不受影响。

🛡️ 解决方案:用户可以通过启用威胁防御订阅,并开启Threat ID 510003和510004来阻止针对此漏洞的攻击。这些Threat ID在Applications and Threats内容版本8970中引入。

🚫 临时缓解:作为替代方案,用户可以选择禁用Clientless VPN功能,以降低潜在的安全风险。

🔥 适用版本:该安全问题影响多个PAN-OS版本,包括但不限于11.2.x, 11.1.x, 10.2.x 和 10.1.x。

For GlobalProtect users with Clientless VPN enabled, there is a limited impact on confidentiality due to inherent risks of Clientless VPN that facilitate credential theft. You can read more about this risk in the informational bulletin PAN-SA-2025-0005. There is no impact to confidentiality for GlobalProtect users if you did not enable (or you disable) Clientless VPN.

This issue is applicable only to PAN-OS firewall configurations with an enabled GlobalProtect gateway or portal.

Customers with a Threat Prevention subscription can block attacks for this vulnerability by enabling Threat ID 510003 and 510004 (introduced in Applications and Threats content version 8970).

You can also disable Clientless VPN. For more information, review the security advisory PAN-SA-2025-0005.

cpe:2.3:o:paloaltonetworks:pan-os:11.2.7:*:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:11.2.6:*:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:11.2.5:*:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:11.2.4:*:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:11.2.3:*:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:11.2.2:*:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:11.2.1:*:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:11.2.0:*:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:11.1.10:*:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:11.1.9:*:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:11.1.8:*:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:11.1.6:*:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:11.1.5:*:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:*:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:*:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:*:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:11.1.1:*:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:11.1.0:*:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:10.2.16:*:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:10.2.15:*:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:10.2.14:*:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:10.2.13:*:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:10.2.12:*:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:*:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:*:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:*:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:*:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:*:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:10.2.6:*:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:*:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:*:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:*:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:*:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:10.2.1:*:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:10.2.0:*:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:*:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:10.1.13:*:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:10.1.12:*:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:10.1.11:*:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:10.1.10:*:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:10.1.9:*:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:10.1.8:*:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:10.1.7:*:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:10.1.6:*:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:10.1.5:*:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:10.1.4:*:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:10.1.3:*:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:10.1.2:*:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:10.1.1:*:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:10.1.0:*:*:*:*:*:*:*

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

GlobalProtect Clientless VPN PAN-OS 安全漏洞 威胁防御
相关文章