A flaw patched last week by Palo Alto Networks is now under active attack and, when chained with two older vulnerabilities, allows attackers to gain root access to affected systems.
This story starts with CVE-2024-9474, a 6.9-rated privilege escalation vulnerability in Palo Alto Networks PAN-OS software that allowed an OS administrator with access to the management web interface to perform actions on the firewall with root privileges. The company patched it in November 2024.
Dark web intelligence services vendor Searchlight Cyber’s Assetnote team investigated the patch for CVE-2024-9474 and found another authentication bypass.
Palo Alto (PAN) last week fixed that problem, CVE-2025-0108, and rated it a highest urgency patch as the 8.8/10 flaw addressed an access control issue in PAN-OS’s web management interface that allowed an unauthenticated attacker with network access to the management web interface to bypass authentication “and invoke certain PHP scripts.” Those scripts could “negatively impact integrity and confidentiality of PAN-OS.”
The third flaw is CVE-2025-0111 a 7.1-rated mess also patched last week to stop authenticated attackers with network access to PAN-OS machines using their web interface to read files accessible to the “nobody” user.
On Tuesday, US time, Palo A lot updated its advisory