WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships (TLP: CLEAR) Vulnerabilities in Palo Alto Network Firewalls Actively Exploited in Chained Attacks
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

(TLP: CLEAR) Vulnerabilities in Palo Alto Network Firewalls Actively Exploited in Chained Attacks

TLP:CLEAR

Author: Chase Snow

Created: Thursday, February 20, 2025 - 13:58

Categories: Cybersecurity, Federal & State Resources, Security Preparedness

Summary: Threat actors are actively exploiting multiple vulnerabilities in Palo Alto Networks (PAN) firewalls, particularly CVE-2025-0108, which CISA added to its Known Exploited Vulnerabilities (KEV) catalog on Tuesday. An authentication bypass in the PAN-OS software enables an unauthenticated attacker with network access to access the management web interface to bypass the authentication otherwise required by the PAN-OS management web interface. This high-severity flaw allows unauthenticated attackers to execute specific PHP scripts, potentially leading to unauthorized access to systems.

Analyst Note: Palo Alto Networks has confirmed that it has observed exploit attempts chaining CVE-2025-0108 with CVE-2024-9474 and CVE-2025-0111, which, in addition to authentication bypass, enables attackers to escalate privileges. WaterISAC urges members to apply the patches and recommended mitigations provided by Palo Alto Networks. Members with internet-facing Palo Alto Networks’ firewalls that haven’t been upgraded immediately after the release of the latest security updates should assume the devices have been compromised and should hunt for evidence of compromise and the presence of planted malware. There are no publicly available indicators of compromise at this time.

Original Source: https://securityadvisories.paloaltonetworks.com/CVE-2025-0108

Additional Reading:

  • CISA Adds Two Known Exploited Vulnerabilities to Catalog
  • Attackers are chaining flaws to breach Palo Alto Networks firewalls
  • Palo Alto Networks warns that CVE-2025-0111 flaw is actively exploited in attacks

Related WaterISAC PIRs: 6, 8, 12

Related Resources

(TLP:CLEAR) FIRESTARTER Backdoor and Updated Emergency Directive for CISCO Firepower and Secure Firewall Devices

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:GREEN) FBI FLASH – Newly Observed Ransomware Variant Black Shrantac Threat to U.S. Entities

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Likely PRC State-Sponsored Activity Observed in the Water Sector – DocuSign Phishing Tactics Identified

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar