The attacker must have network access to the management web interface and successfully authenticate to exploit this issue.
Cloud NGFW and Prisma Access are not impacted by this vulnerability.
Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2025-18223 | A command injection vulnerability in Palo Alto Networks PAN-OS® enables an authenticated administrative user to perform actions as the root user. The attacker must have network access to the management web interface and successfully authenticate to exploit this issue. Cloud NGFW and Prisma Access are not impacted by this vulnerability. |
Solution
Version Minor Version Suggested Solution PAN-OS 11.2 No action needed.PAN-OS 11.1 No action needed. PAN-OS 11.0* 11.0.0 through 11.0.2 Upgrade to 11.0.3 or later. PAN-OS 10.2 10.2.0 through 10.2.7 Upgrade to 10.2.8 or later. PAN-OS 10.1Upgrade to 10.2.8 or 11.0.3 or later.All older unsupported PAN-OS versions Upgrade to a supported fixed version. *PAN-OS 11.0 has reached EoL. We listed it here for completeness because a patch for PAN-OS 11.0 was released before it reached EoL. If you are still using any vulnerable EoL versions, we strongly recommend that you upgrade to a supported fixed PAN-OS version.
Workaround
Recommended mitigation—The vast majority of firewalls already follow Palo Alto Networks and industry best practices. However, if you have not already, we strongly recommend that you secure access to your management interface according to our https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 * Palo Alto Networks official and detailed technical documentation: https://docs.paloaltonetworks.com/best-practices/10-1/administrative-access-best-practices/administrative-access-best-practices/deploy-administrative-access-best-practices
Link | Providers |
---|---|
https://security.paloaltonetworks.com/CVE-2025-4231 |
![]() ![]() |
Wed, 22 Oct 2025 13:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Paloaltonetworks
Paloaltonetworks pan-os |
|
CPEs | cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:* | |
Vendors & Products |
Paloaltonetworks
Paloaltonetworks pan-os |
|
Metrics |
cvssV3_1
|
Mon, 14 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Fri, 13 Jun 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 12 Jun 2025 23:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A command injection vulnerability in Palo Alto Networks PAN-OS® enables an authenticated administrative user to perform actions as the root user. The attacker must have network access to the management web interface and successfully authenticate to exploit this issue. Cloud NGFW and Prisma Access are not impacted by this vulnerability. | |
Title | PAN-OS: Authenticated Admin Command Injection Vulnerability in the Management Web Interface | |
First Time appeared |
Palo Alto Networks
Palo Alto Networks pan-os |
|
Weaknesses | CWE-77 | |
CPEs | cpe:2.3:o:palo_alto_networks:pan-os:10.1.0:*:*:*:*:*:*:* cpe:2.3:o:palo_alto_networks:pan-os:10.1.10:*:*:*:*:*:*:* cpe:2.3:o:palo_alto_networks:pan-os:10.1.11:*:*:*:*:*:*:* cpe:2.3:o:palo_alto_networks:pan-os:10.1.12:*:*:*:*:*:*:* cpe:2.3:o:palo_alto_networks:pan-os:10.1.13:*:*:*:*:*:*:* cpe:2.3:o:palo_alto_networks:pan-os:10.1.14:*:*:*:*:*:*:* cpe:2.3:o:palo_alto_networks:pan-os:10.1.1:*:*:*:*:*:*:* cpe:2.3:o:palo_alto_networks:pan-os:10.1.2:*:*:*:*:*:*:* cpe:2.3:o:palo_alto_networks:pan-os:10.1.3:*:*:*:*:*:*:* cpe:2.3:o:palo_alto_networks:pan-os:10.1.4:*:*:*:*:*:*:* cpe:2.3:o:palo_alto_networks:pan-os:10.1.5:*:*:*:*:*:*:* cpe:2.3:o:palo_alto_networks:pan-os:10.1.6:*:*:*:*:*:*:* cpe:2.3:o:palo_alto_networks:pan-os:10.1.7:*:*:*:*:*:*:* cpe:2.3:o:palo_alto_networks:pan-os:10.1.8:*:*:*:*:*:*:* cpe:2.3:o:palo_alto_networks:pan-os:10.1.9:*:*:*:*:*:*:* cpe:2.3:o:palo_alto_networks:pan-os:10.2.0:*:*:*:*:*:*:* cpe:2.3:o:palo_alto_networks:pan-os:10.2.1:*:*:*:*:*:*:* cpe:2.3:o:palo_alto_networks:pan-os:10.2.2:*:*:*:*:*:*:* cpe:2.3:o:palo_alto_networks:pan-os:10.2.3:*:*:*:*:*:*:* cpe:2.3:o:palo_alto_networks:pan-os:10.2.4:*:*:*:*:*:*:* cpe:2.3:o:palo_alto_networks:pan-os:10.2.5:*:*:*:*:*:*:* cpe:2.3:o:palo_alto_networks:pan-os:10.2.6:*:*:*:*:*:*:* cpe:2.3:o:palo_alto_networks:pan-os:10.2.7:*:*:*:*:*:*:* cpe:2.3:o:palo_alto_networks:pan-os:11.0.0:*:*:*:*:*:*:* cpe:2.3:o:palo_alto_networks:pan-os:11.0.1:*:*:*:*:*:*:* cpe:2.3:o:palo_alto_networks:pan-os:11.0.2:*:*:*:*:*:*:* |
|
Vendors & Products |
Palo Alto Networks
Palo Alto Networks pan-os |
|
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: palo_alto
Published:
Updated: 2025-06-13T13:32:58.253Z
Reserved: 2025-05-02T19:10:44.240Z
Link: CVE-2025-4231

Updated: 2025-06-13T13:32:55.162Z

Status : Analyzed
Published: 2025-06-13T00:15:23.533
Modified: 2025-10-22T12:57:48.007
Link: CVE-2025-4231

No data.

No data.