1.0 Introduction
Recently, Palo Alto Networks has released security updates to address two high severity vulnerabilities in its PAN-OS network security operating system.
2.0 Impact
These vulnerabilities could allow attackers to bypass authentication and execute arbitrary commands.
3.0 Affected Products
- PAN-OS 11.2 (before 11.2.4-h4)
- PAN-OS 11.1 (before 11.1.6-h1)
- PAN-OS 10.2 (before 10.2.13-h3)
- PAN-OS 10.1 (before 10.1.14-h9)
- PAN-OS OpenConfig plugin versions before 2.1.2.
4.0 Recommendations
CyberSecurity Malaysia encourages users and administrators to review
Palo Alto Network Security Advisories
for more information and apply the necessary updates.
Kindly refer to the following URLs for more information:
- https://security.paloaltonetworks.com/CVE-2025-0108
- https://security.paloaltonetworks.com/CVE-2025-0110
Generally, Cyber999 advises the users to be updated with the latest security announcements by the vendor and follow best practice security policies to determine which updates should be applied.
For further enquiries, please contact us through the following channels:
E-mail: cyber999[at]cybersecurity.my
Phone: 1-300-88-2999 (monitored during business hours)
Mobile: +60 19 2665850 (24x7 call incident reporting)
Business Hours: Mon - Fri 08:30 -17:30 MYT
Web:
https://www.mycert.org.my
5.0 References