This issue does not affect Cloud NGFW or Prisma Access.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-14922 | Malicious code in bioql (PyPI) |
Solution
No solution given by the vendor.
Workaround
If you are not using the web proxy feature, you can disable it to mitigate this issue. For more information regarding the web proxy feature, see our documentation regarding the web proxy feature https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-new-features/networking-features/web-proxyhttps:// .
| Link | Providers |
|---|---|
| https://security.paloaltonetworks.com/CVE-2025-0130 |
|
Mon, 06 Oct 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:*:h1:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.1.7:-:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.1.7:h1:*:*:*:*:*:* |
|
| Metrics |
cvssV3_1
|
Thu, 15 May 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 14 May 2025 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A missing exception check in Palo Alto Networks PAN-OS® software with the web proxy feature enabled allows an unauthenticated attacker to send a burst of maliciously crafted packets that causes the firewall to become unresponsive and eventually reboot. Repeated successful attempts to trigger this condition will cause the firewall to enter maintenance mode. This issue does not affect Cloud NGFW or Prisma Access. | |
| Title | PAN-OS: Firewall Denial-of-Service (DoS) in the Web-Proxy Feature via a Burst of Maliciously Crafted Packets | |
| First Time appeared |
Paloaltonetworks
Paloaltonetworks pan-os |
|
| Weaknesses | CWE-754 | |
| CPEs | cpe:2.3:o:paloaltonetworks:pan-os:11.1.0:*:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.1.1:*:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:*:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:*:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:*:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.1.5:*:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.1.6:-:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.2.0:*:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.2.1:*:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.2.2:*:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.2.3:*:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:11.2.4:*:*:*:*:*:*:* |
|
| Vendors & Products |
Paloaltonetworks
Paloaltonetworks pan-os |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: palo_alto
Published:
Updated: 2025-05-15T13:49:45.683Z
Reserved: 2024-12-20T23:23:30.807Z
Link: CVE-2025-0130
Updated: 2025-05-15T13:49:42.913Z
Status : Analyzed
Published: 2025-05-14T18:15:29.723
Modified: 2025-10-06T16:18:22.213
Link: CVE-2025-0130
No data.
OpenCVE Enrichment
No data.
EUVD