Palo Alto 安全中心 05月15日 00:26
CVE-2025-0130 PAN-OS: Firewall Denial-of-Service (DoS) in the Web-Proxy Feature via a Burst of Maliciously Crafted Packets (Severity: MEDIUM)
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

Palo Alto Networks发布安全公告,指出PAN-OS防火墙的Web代理功能存在拒绝服务(DoS)漏洞(CVE-2025-0130)。未经验证的攻击者可利用恶意构造的数据包导致防火墙无响应并重启,多次攻击可能使防火墙进入维护模式。该漏洞影响PAN-OS 11.0及更高版本,但Cloud NGFW和Prisma Access不受影响。建议受影响用户升级至指定版本,或禁用Web代理功能以缓解风险。

⚠️PAN-OS防火墙Web代理功能存在DoS漏洞,攻击者可发送恶意数据包导致防火墙崩溃。该漏洞编号为CVE-2025-0130,影响开启了Web代理功能的PAN-OS设备。

🛡️受影响的版本包括PAN-OS 11.0至11.2.4以及11.1.0至11.1.7。PAN-OS 11.0已停止维护,不再提供修复。建议升级至11.2.5或更高版本,或11.1.7-h2、11.1.8或更高版本。

💡缓解措施:如未使用Web代理功能,可将其禁用。漏洞利用复杂度高,但可自动利用,无需用户交互或特权。CVSS评分为8.2,属于中危漏洞。

Palo Alto Networks Security Advisories

/

CVE-2025-0130

CVE-2025-0130 PAN-OS: Firewall Denial-of-Service (DoS) in the Web-Proxy Feature via a Burst of Maliciously Crafted Packets

Exploit MaturityUNREPORTED

Response EffortLOW

RecoveryUSER

Value DensityCONCENTRATED

Attack VectorNETWORK

Attack ComplexityHIGH

Attack RequirementsNONE

AutomatableYES

User InteractionNONE

Product ConfidentialityNONE

Product IntegrityNONE

Product AvailabilityHIGH

Privileges RequiredNONE

Subsequent ConfidentialityNONE

Subsequent IntegrityNONE

Subsequent AvailabilityNONE

Description

A missing exception check in Palo Alto Networks PAN-OS® software with the web proxy feature enabled allows an unauthenticated attacker to send a burst of maliciously crafted packets that causes the firewall to become unresponsive and eventually reboot. Repeated successful attempts to trigger this condition will cause the firewall to enter maintenance mode.

This issue does not affect Cloud NGFW or Prisma Access.

Product Status

This issue affects only PAN-OS 11.0 and later PAN-OS versions. PAN-OS 11.0 software is end-of-life (EoL) so we do not intend to fix this issue in this version.

Required Configuration for Exposure

This issue only affects PAN-OS firewalls that have the web proxy feature enabled. This feature is only available on PAN-OS 11.0 and above. Additionally a license is required to use the web proxy feature.
To verify if you have configured web proxy on your PAN-OS device, see our documentation regarding the web proxy feature.

Severity:MEDIUM, Suggested Urgency:MODERATE

CVSS-BT:4.6 /CVSS-B:8.2 (CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/AU:Y/R:U/V:C/RE:L/U:Amber)

Exploitation Status

Palo Alto Networks is not aware of any malicious exploitation of this issue.

Weakness Type and Impact

CWE-754 Improper Check for Unusual or Exceptional Conditions

CAPEC-583 Disabling Network Hardware

Solution

Version
Minor Version
Suggested Solution
PAN-OS 11.2
11.2.0 through 11.2.4Upgrade to 11.2.5 or later.
PAN-OS 11.111.1.0 through 11.1.7
Upgrade to 11.1.7-h2 or 11.1.8 or later.
 11.1.0 through 11.1.6Upgrade to 11.1.6-h1 or 11.1.8 or later.
PAN-OS 11.0 (EoL)

Upgrade to a supported fixed version.
PAN-OS 10.2
No action needed.
PAN-OS 10.1
No action needed.
All other
unsupported
PAN-OS versions
 Upgrade to a supported fixed version.

Workarounds and Mitigations

If you are not using the web proxy feature, you can disable it to mitigate this issue. For more information regarding the web proxy feature, see our documentation regarding the web proxy feature.

Acknowledgments

Palo Alto Networks thanks Jari Pietila of Palo Alto Networks for discovering and reporting the issue.

CPEs

cpe:2.3:o:paloaltonetworks:pan-os:11.2.4:*:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:11.2.3:*:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:11.2.2:*:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:11.2.1:*:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:11.2.0:*:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:11.1.6:-:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:11.1.5:*:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:*:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:*:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:*:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:11.1.1:*:*:*:*:*:*:*

cpe:2.3:o:paloaltonetworks:pan-os:11.1.0:*:*:*:*:*:*:*

Timeline

Initial publication

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

PAN-OS 防火墙 DoS漏洞 Web代理
相关文章