Sunday, April 20, 2025
HomeCVE/vulnerabilityPAN-OS DoS Vulnerability Allows Attackers to Force Repeated Firewall Reboots

PAN-OS DoS Vulnerability Allows Attackers to Force Repeated Firewall Reboots

Published on

SIEM as a Service

Follow Us on Google News

A newly disclosed denial-of-service (DoS) vulnerability in Palo Alto Networks’ PAN-OS software enables attackers to force firewalls into repeated reboots using maliciously crafted packets.

Tracked as CVE-2025-0128, the flaw impacts SCEP (Simple Certificate Enrollment Protocol) authentication and poses significant risks to unpatched systems.

The vulnerability, CVE-2025-0128, enables unauthenticated attackers to disrupt network operations by sending a single malicious packet, triggering repeated firewall reboots.

- Advertisement - Google News

These attacks force firewalls into maintenance mode, significantly impacting network availability and creating potential downtime for critical systems.

Palo Alto Networks has rated the severity of this issue as 6.6 (MEDIUM) on the CVSS v4.0 scale, with an 8.7 Base Score for unpatched PAN-OS systems.

Immediate mitigation and upgrades are essential to minimize the risk of exploitation. The vulnerability stems from improper checks in SCEP authentication handling.

Attackers exploiting this flaw bypass standard security controls, causing the firewall’s management plane to crash and reboot.

Systems not explicitly configured to use SCEP remain vulnerable, requiring immediate mitigation.

Affected Products

ComponentAffected VersionsUnaffected/Fixed Versions
PAN-OS 11.2< 11.2.3≥ 11.2.3
PAN-OS 11.1< 11.1.5≥ 11.1.5
PAN-OS 10.2< 10.2.11≥ 10.2.11
Prisma Access< 10.2.4-h36, < 10.2.10-h16, < 11.2.4-h5≥ 10.2.4-h36, ≥ 10.2.10-h16, ≥ 11.2.4-h5
EoL VersionsPAN-OS 11.0, 10.0, 9.1, 9.0, and earlierPresumed vulnerable (no fixes planned)

Cloud NGFW and proactively updated Prisma Access tenants are not impacted.

Mitigation and Solutions

Palo Alto Networks recommends the following actions:

1. Immediate Upgrades

PAN-OS VersionFixed Version
11.2.xUpgrade to 11.2.3+
11.1.xUpgrade to 11.1.5+
10.2.xUpgrade to 10.2.11+

2. Workaround

Disable SCEP authentication via CLI for temporary protection:

> debug sslmgr set disable-scep-auth-cookie yes 

3. Prisma Access

Tenants have been automatically protected since March 21, 2025.

Vulnerability Summary Table

MetricDetails
CVE IDCVE-2025-0128
CVSS v4.0 Score6.6 (MEDIUM) / 8.7 (Base)
Exploit MaturityUnreported
Attack ComplexityLow (No prerequisites)
ImpactHigh Availability Loss
AutomatableYes
Public ExploitsNone observed as of April 10, 2025

While no active exploitation has been reported, Palo Alto Networks classifies this vulnerability as having MODERATE urgency due to its potential to disrupt critical services.

Administrators should prioritize patching, especially for firewalls exposed to untrusted networks.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

10 Best Patch Management Tools 2025

In today's digital landscape, maintaining secure and efficient IT systems is critical for organizations....

10 Best Cloud Security Solutions 2025

In today’s digital era, businesses are increasingly adopting cloud computing to store data, run...

Chinese Hackers Exploit Ivanti Connect Secure Flaw to Gain Unauthorized Access

In a sophisticated cyber-espionage operation, a group known as UNC5221, suspected to have China-nexus,...

New Android SuperCard X Malware Uses NFC-Relay Technique for POS & ATM Transactions

A new malware strain known as SuperCard X has emerged, utilizing an innovative Near-Field...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

10 Best Patch Management Tools 2025

In today's digital landscape, maintaining secure and efficient IT systems is critical for organizations....

10 Best Cloud Security Solutions 2025

In today’s digital era, businesses are increasingly adopting cloud computing to store data, run...

Chinese Hackers Exploit Ivanti Connect Secure Flaw to Gain Unauthorized Access

In a sophisticated cyber-espionage operation, a group known as UNC5221, suspected to have China-nexus,...