CVEFinder.io

CVE-2025-0124

ℹ️ low
🔍 Scan for this CVE
Summary

An authenticated file deletion vulnerability in the Palo Alto Networks PAN-OS® software enables an authenticated attacker with network access to the management web interface to delete certain files as the “nobody” user; this includes limited logs and configuration files but does not include system files. The attacker must have network access to the management web interface to exploit this issue. You greatly reduce the risk of this issue by restricting access to the management web interface to o

Description

An authenticated file deletion vulnerability in the Palo Alto Networks PAN-OS® software enables an authenticated attacker with network access to the management web interface to delete certain files as the “nobody” user; this includes limited logs and configuration files but does not include system files.

The attacker must have network access to the management web interface to exploit this issue. You greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended critical deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 .

This issue affects Cloud NGFW. However, this issue does not affect Prisma® Access software.

CVSS Score
3.8
Low
EPSS Score
0.5
Exploit Probability
Published Date
2025-04-11
First Seen: 2026-01-05
📊 Relative Risk Intelligence

This CVE is Lower Risk - more severe than 4.4% of all 321,136 vulnerabilities in our database.

#306,896
Below average severity
Severity Percentile
🎯 CISA SSVC Assessment Updated: Apr 11, 2025
🔍 Exploitation Status
None
No known exploits
⚙️ Automatable
NO
Requires human interaction
💥 Technical Impact
Partial
Limited system impact
🏆 Discovered By
VISA, Inc.
SSVC data provided by CISA
Last Modified 2025-10-02
Source NVD 🔗
CVSS Vector 3.1 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L
CVSS Vector 4.0 CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:U/V:C/RE:M/U:Amber
CWE IDs (Weakness Types)

📦 Affected Products 6

🔗 References 1

🔗 Related CVEs 6

CVE ID Severity CVSS EPSS Summary Published
CVE-2026-0300 ⛔ critical 9.8 5.3 A buffer overflow vulnerability in the User-ID™ Authentication Portal (aka Captive Portal) service of Palo Alto Networ... 2026-05-06
CVE-2026-0227 ⚠️ high 7.5 0.1 A vulnerability in Palo Alto Networks PAN-OS software enables an unauthenticated attacker to cause a denial of service (... 2026-01-15
CVE-2025-4614 ℹ️ low 2.7 0.1 An information disclosure vulnerability in Palo Alto Networks PAN-OS® software enables an authenticated administrator t... 2025-10-09
CVE-2025-4615 ⚠️ high 7.2 0.1 An improper input neutralization vulnerability in the management web interface of the Palo Alto Networks PAN-OS® softwa... 2025-10-09
CVE-2025-4231 ⚠️ high 7.2 0.1 A command injection vulnerability in Palo Alto Networks PAN-OS® enables an authenticated administrative user to perform... 2025-06-13
CVE-2025-0130 ⚠️ high 7.5 0.1 A missing exception check in Palo Alto Networks PAN-OS® software with the web proxy feature enabled allows an unauthent... 2025-05-14
These CVEs affect the same products