CVE-2025-0108 Scanner

CVE-2025-0108 Scanner - Authentication Bypass vulnerability in PAN-OS

Short Info


Level

Critical

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 seconds

Time Interval

1 week 21 hours

Scan only one

URL

Toolbox

-

PAN-OS is a security operating system developed by Palo Alto Networks, primarily used in their next-generation firewalls. It manages firewall policies, security profiles, and access controls for enterprise networks. The platform is widely deployed across industries to safeguard sensitive data and ensure network security. PAN-OS is designed to be highly reliable, secure, and scalable to meet the demands of large enterprises. The management interface is critical for configuring and monitoring the firewall, and any vulnerabilities within this interface can lead to severe security risks. This product is used globally by organizations to protect their network infrastructure from cyber threats.

The 'Authentication Bypass' vulnerability in PAN-OS occurs due to path confusion between Nginx and Apache handlers. This issue arises because of how these web servers process URLs differently. An attacker can exploit this vulnerability by using double URL encoding and directory traversal techniques, which bypasses authentication checks. Specifically, the vulnerability occurs when the system fails to properly handle requests containing maliciously crafted URLs. This allows unauthorized access to the management interface, posing a critical security risk to the affected system. The flaw is severe as it grants attackers full access to the system without needing valid credentials.

The vulnerability is triggered when an attacker sends a specially crafted HTTP request to the PAN-OS management interface. The request leverages double URL encoding and directory traversal patterns to confuse the path processing mechanisms of Nginx and Apache. This confusion leads to the bypassing of authentication checks that would normally block unauthorized access. The vulnerable endpoint is located at "/unauth/%252e%252e/php/ztp_gate.php/PAN_help/x.css", and the vulnerable parameter is the URL path. The attack results in a successful authentication bypass, potentially granting the attacker full administrative privileges. Since this vulnerability is present in the management interface, it can lead to total compromise of the system.

Exploitation of this vulnerability can allow attackers to bypass authentication checks and gain unauthorized access to the PAN-OS management interface. This could lead to the attacker taking full control of the firewall, altering security configurations, and compromising sensitive data. Malicious actors could potentially disable security features, change firewall rules, or even launch further attacks on the internal network. The attacker may be able to escalate privileges to root or admin level, severely undermining the security of the network. The effects of this vulnerability can result in data breaches, service disruptions, or complete system compromise, making it a critical issue for affected organizations.

REFERENCES

Get started to protecting your Free Full Security Scan