Description:
Palo Alto has published a security advisory to address the vulnerabilities in PAN-OS. The detailed information about the vulnerabilities can be found at:
https://securityadvisories.paloaltonetworks.com/PAN-SA-2025-0012
Reports indicated that an elevation of privilege vulnerability (CVE-2024-1086) affecting PAN-OS firewalls is being exploited in the wild. System administrators are advised to take immediate actions as recommended by the vendor to mitigate the elevated risk of cyber attacks.
Affected Systems:
- PAN-OS 10.2 versions prior to 10.2.14
- PAN-OS 11.1 versions prior to 11.1.8
- PAN-OS 11.2 versions prior to 11.2.5
For detailed information of the affected systems, please refer to the corresponding security advisory at vendor's website.
Impact:
Successful exploitation of the vulnerabilities could lead to remote code execution, elevation of privilege, denial of service, information disclosure or security restriction bypass on an affected system.
Recommendation:
Patches for affected systems are now available. For detailed information of the available patches, please refer to the section "Solution" of corresponding security advisory at vendor's website.
System administrators of affected systems should follow the recommendations provided by the vendor and take immediate actions to mitigate the risk.
More Information:
- https://securityadvisories.paloaltonetworks.com/PAN-SA-2025-0012
- https://www.hkcert.org/security-bulletin/palo-alto-pan-os-multiple-vulnerabilities_20250711
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5827
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13750 (to CVE-2019-13751)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19603
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9283
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13434 (to CVE-2020-13435)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14040
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15358
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29652
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20305
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27918
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1962
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28131
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30633
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3978
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27536
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28321 (to CVE-2023-28322)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38546
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43804
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46218
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1086
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34155