Categories: Cyber Security News

Palo Alto PAN-OS Firewall Vulnerability Let Attackers Reboot Firewall by Sending Malicious Packet

Palo Alto Networks has disclosed a critical denial-of-service vulnerability in its PAN-OS firewall software that allows unauthenticated attackers to remotely reboot firewalls by sending specially crafted packets.

Tracked as CVE-2025-4619, the vulnerability poses significant risks to organizations relying on Palo Alto firewalls for network security.

The flaw, identified as CWE-754 (Improper Check for Unusual or Exceptional Conditions), exists in the PAN-OS software dataplane.

Attackers can exploit this vulnerability without authentication, credentials, or user interaction. When successful, the malicious packet triggers an unexpected reboot of the firewall.

More concerning, repeated exploitation attempts can force the firewall into maintenance mode. Severely interrupting network operations and potentially leaving organizations exposed to threats during downtime.

Attribute Value
CVE ID CVE-2025-4619
Reference PAN-247099
Vulnerability Type Denial of Service (DoS)
Weakness CWE-754: Improper Check for Unusual or Exceptional Conditions
CVSS v4.0 Score 6.6 (MEDIUM)
CVSS-B Score 8.7

Palo Alto Networks assigned the vulnerability a CVSS 4.0 score of 6.6, rating it as MEDIUM severity with MODERATE urgency.

However, the CVSS-B score reaches 8.7, reflecting the potential business impact. The attack vector is network-based and low-complexity.

The vulnerability directly affects product availability, highlighting its potential to interrupt critical network infrastructure.

PA-Series, VM-Series, and Prisma Access Deployments

The vulnerability affects PA-Series firewalls, VM-Series firewalls, and Prisma Access deployments that are running vulnerable versions of PAN-OS. Cloud NGFW is not impacted.

Vulnerable versions include PAN-OS 10.2 (through 10.2.13), 11.1 (through 11.1.6), and 11.2 (through 11.2.4). PAN-OS 12.1 and 10.1 are unaffected.

Importantly, exploitation requires a specific configuration: the firewall must have a URL proxy or a decrypt policy enabled; even with explicit no-decrypt policies, the vulnerability may be exploitable.

Palo Alto Networks recommends upgrading to patched versions. For PAN-OS 11.2. Organizations should update to 11.2.5 or later.

For 11.1, upgrade to 11.1.7. PAN-OS 10.2 users should patch to 10.2.14 or apply the appropriate urgency, depending on their current version. The company reports that no known workarounds currently exist.

Currently, Palo Alto Networks has not identified any active malicious exploitation of this vulnerability. Administrators should prioritize patching given the ease of exploitation and potential operational impact.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

The post Palo Alto PAN-OS Firewall Vulnerability Let Attackers Reboot Firewall by Sending Malicious Packet appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

‘They Stopped Making Those Requests’ — Alice: Madness Returns Director American McGee Got Creative After EA Asked to ‘Make Things More Sexy’

Alice: Madness Returns creator and director American McGee says he "pasted dildos" on the head…

12 minutes ago

Indie Horror Games Are Invading Hollywood, and They Have the Fans to Thank For It

Watching a streamer find their way through the digital labyrinth of some spooky game—particularly one…

2 hours ago

GPT‑5.5 Bio Bug Bounty to Strengthen Advanced AI Capabilities

OpenAI has announced a new Bio Bug Bounty program for GPT-5.5 as part of its…

2 hours ago

Bucks County NAACP Hosts ‘Black History and Democracy at Risk’ Town Hall

In the wake of the 2024 presidential election, communities across the country are still reeling…

2 hours ago

Steel Ball Run Doesn’t Have A Theme Song Yet, JoJo’s Fans Made One Anyway

Though we’ve previously reported that the anime adaptation of JoJo’s Bizarre Adventure: Steel Ball Run…

3 hours ago

A Look Back, April 25

200 Years Ago John Clarke, directly opposite the Meeting House in Northampton, has on hand…

3 hours ago

This website uses cookies.