Palo Alto 安全中心 06月12日 00:13
CVE-2025-4231 PAN-OS: Authenticated Admin Command Injection Vulnerability in the Management Web Interface (Severity: MEDIUM)
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

Palo Alto Networks发布安全通告,披露PAN-OS管理Web界面中的一个已认证管理员命令注入漏洞(CVE-2025-4231)。该漏洞允许攻击者以root用户身份执行操作。受影响的产品版本和缓解措施已在通告中详细说明,建议用户尽快采取措施,如限制管理界面访问,以降低风险。

🔑 漏洞描述:Palo Alto Networks PAN-OS中的一个命令注入漏洞,允许已通过身份验证的管理员执行root用户权限的操作。

⚠️ 影响范围:该漏洞影响允许从互联网或任何不受信任网络访问管理Web界面的PAN-OS版本。Cloud NGFW和Prisma Access不受影响。

🛡️ 缓解措施:强烈建议限制管理界面访问,仅允许可信内部IP地址访问。对于受影响的PAN-OS版本,需要升级到推荐的修复版本。

🔍 风险评估:该漏洞的严重程度被评估为中等,但如果允许从互联网访问管理界面,风险将显著增加。

🛠️ 解决方案:针对PAN-OS 10.1、10.2和11.0版本,提供了具体的升级建议,以修复该漏洞。

Palo Alto Networks Security Advisories

/

CVE-2025-4231

CVE-2025-4231 PAN-OS: Authenticated Admin Command Injection Vulnerability in the Management Web Interface

Exploit MaturityUNREPORTED

Response EffortMODERATE

RecoveryUSER

Value DensityCONCENTRATED

Attack VectorNETWORK

Attack ComplexityLOW

Attack RequirementsNONE

AutomatableNO

User InteractionNONE

Product ConfidentialityHIGH

Product IntegrityHIGH

Product AvailabilityHIGH

Privileges RequiredHIGH

Subsequent ConfidentialityLOW

Subsequent IntegrityNONE

Subsequent AvailabilityNONE

Description

A command injection vulnerability in Palo Alto Networks PAN-OS® enables an authenticated administrative user to perform actions as the root user.

The attacker must have network access to the management web interface and successfully authenticate to exploit this issue.

Cloud NGFW and Prisma Access are not impacted by this vulnerability.

Product Status

Required Configuration for Exposure

The risk is greatest if you allow access to the management web interface from the internet or from any untrusted network either:

    Directly; or

    Through a dataplane interface that includes a management interface profile.

You greatly reduce the risk if you ensure that you allow only trusted internal IP addresses to access the management web interface.

Use the following steps to identify your recently detected devices in our internet scans.

    To find any assets that require remediation, visit the Assets section of the Customer Support Portal:https://support.paloaltonetworks.com and then select Products → Assets → All Assets → Remediation Required).

    Review the list of your assets that we discovered in our scans to have an internet-facing management interface. We tagged these assets with ‘PAN-SA-2024-0015’ and a last seen timestamp (in UTC). If you do not see any such assets listed, then our scan did not find any devices associated with your account in the past three days that have an internet-facing management interface.

GlobalProtect™ portals and gateways are not vulnerable to this issue. However, if you configure a management profile on interfaces with GlobalProtect portals or gateways, then you are exposing the firewall to attacks through the management web interface (typically accessible on port 4443).

Severity:MEDIUM, Suggested Urgency:MODERATE

The risk is highest when you allow access to the management interface from external IP addresses on the internet.
MEDIUM- CVSS-BT: 6.1 /CVSS-B: 8.6 (CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:L/SI:N/SA:N/E:U/AU:N/R:U/V:C/RE:M/U:Amber)

You can greatly reduce the risk of exploitation by restricting access to a jump box that is the only system allowed to access the management interface. This will ensure that attacks can succeed only if they obtain privileged access through those specified IP addresses.
MEDIUM- CVSS-BT: 4.0 /CVSS-B: 7.1 (CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:L/SI:N/SA:N/E:U/AU:N/R:U/V:C/RE:M/U:Amber)

Exploitation Status

Palo Alto Networks is not aware of any malicious exploitation of this issue.

Weakness Type and Impact

CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')

CAPEC-233 Privilege Escalation

Solution

Version
Minor Version
Suggested Solution
PAN-OS 11.2
No action needed.
PAN-OS 11.1
No action needed.
PAN-OS 11.0*
11.0.0 through 11.0.2 Upgrade to 11.0.3 or later.
PAN-OS 10.2
10.2.0 through 10.2.7 Upgrade to 10.2.8 or later.
PAN-OS 10.1Upgrade to 10.2.8 or 11.0.3 or later.
All older
unsupported
PAN-OS versions
 Upgrade to a supported fixed version.

*PAN-OS 11.0 has reached EoL. We listed it here for completeness because a patch for PAN-OS 11.0 was released before it reached EoL. If you are still using any vulnerable EoL versions, we strongly recommend that you upgrade to a supported fixed PAN-OS version.

Workarounds and Mitigations

Recommended mitigation—The vast majority of firewalls already follow Palo Alto Networks and industry best practices. However, if you have not already, we strongly recommend that you secure access to your management interface according to our critical deployment guidelines. Specifically, you should restrict management interface access to only trusted internal IP addresses.

Review more information about how to secure management access to your Palo Alto Networks firewalls in these documents:

Acknowledgments

Palo Alto Networks thanks spcnvdr for discovering and reporting this issue.

CPEs

cpe:2.3:o:palo_alto_networks:pan-os:11.0.2:*:*:*:*:*:*:*

cpe:2.3:o:palo_alto_networks:pan-os:11.0.1:*:*:*:*:*:*:*

cpe:2.3:o:palo_alto_networks:pan-os:11.0.0:*:*:*:*:*:*:*

cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:*:*:*:*:*:*:*

cpe:2.3:o:palo_alto_networks:pan-os:10.2.6:*:*:*:*:*:*:*

cpe:2.3:o:palo_alto_networks:pan-os:10.2.5:*:*:*:*:*:*:*

cpe:2.3:o:palo_alto_networks:pan-os:10.2.4:*:*:*:*:*:*:*

cpe:2.3:o:palo_alto_networks:pan-os:10.2.3:*:*:*:*:*:*:*

cpe:2.3:o:palo_alto_networks:pan-os:10.2.2:*:*:*:*:*:*:*

cpe:2.3:o:palo_alto_networks:pan-os:10.2.1:*:*:*:*:*:*:*

cpe:2.3:o:palo_alto_networks:pan-os:10.2.0:*:*:*:*:*:*:*

cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:*:*:*:*:*:*:*

cpe:2.3:o:palo_alto_networks:pan-os:10.1.13:*:*:*:*:*:*:*

cpe:2.3:o:palo_alto_networks:pan-os:10.1.12:*:*:*:*:*:*:*

cpe:2.3:o:palo_alto_networks:pan-os:10.1.11:*:*:*:*:*:*:*

cpe:2.3:o:palo_alto_networks:pan-os:10.1.10:*:*:*:*:*:*:*

cpe:2.3:o:palo_alto_networks:pan-os:10.1.9:*:*:*:*:*:*:*

cpe:2.3:o:palo_alto_networks:pan-os:10.1.8:*:*:*:*:*:*:*

cpe:2.3:o:palo_alto_networks:pan-os:10.1.7:*:*:*:*:*:*:*

cpe:2.3:o:palo_alto_networks:pan-os:10.1.6:*:*:*:*:*:*:*

cpe:2.3:o:palo_alto_networks:pan-os:10.1.5:*:*:*:*:*:*:*

cpe:2.3:o:palo_alto_networks:pan-os:10.1.4:*:*:*:*:*:*:*

cpe:2.3:o:palo_alto_networks:pan-os:10.1.3:*:*:*:*:*:*:*

cpe:2.3:o:palo_alto_networks:pan-os:10.1.2:*:*:*:*:*:*:*

cpe:2.3:o:palo_alto_networks:pan-os:10.1.1:*:*:*:*:*:*:*

cpe:2.3:o:palo_alto_networks:pan-os:10.1.0:*:*:*:*:*:*:*

Timeline

Initial Publication

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

Palo Alto Networks PAN-OS 安全漏洞 命令注入 CVE-2025-4231
相关文章