Rapid Response status is Operational

Fri 14
Sat 15
Sun 16
Mon 17
Tue 18
Wed 19
Thu 20
now

Rapid Response

Fri 14
Sat 15
Sun 16
Mon 17
Tue 18
Wed 19
Thu 20
now
Last updated 1 minute ago from official status page. Learn more
Stay ahead of Rapid Response outages
Sign up to create a custom dashboard to monitor the services you rely on. 3,000+ services supported.

Active Incidents

No active incidents

Recently Resolved Incidents

Pan-OS Authentication Bypass - CVE-2025-0108
Started 16 Feb 2025 14:39:01 (5 days ago), resolved 17 Feb 2025 11:59:59 (4 days ago)
Incident without Impact
Resolved
Rapid Response

Team AXON is aware of a publication about an Authentication Bypass flaw related to Palo Alto Networks, affecting PAN-OS management web interface. The flaw, identified as CVE-2025-0108, allows an unauthenticated attacker with network access to the management web interface to bypass authentication to the PAN-OS management web interface and invoke certain PHP scripts.

A Proof-of-Concept exploit related to this vulnerability was published.

While invoking these PHP scripts does not enable remote code execution, it can negatively impact the integrity and confidentiality of PAN-OS.

to mitigate the risk, It is recommended to : - patch all the relevant PAN-OS devices. - restrict management interface access to only trusted internal IP addresses. - Threat Prevention subscription can be used to block attacks for this vulnerability by enabling Threat ID 510000 and 510001 (introduced in Applications and Threats content version 8943)

The team is actively searching for evidence of exploitations of this vulnerability in our customers’ environments. In case of identification of impacted customers, they will be notified directly.

Please don’t hesitate to contact us for further assistance or any relevant questions.

Sincerely, Team Axon

Rapid Response Outage Survival Guide

A step-by-step guide to help you survive a Rapid Response outage
NaN%

    Rapid Response Components

    Fri 14
    Sat 15
    Sun 16
    Mon 17
    Tue 18
    Wed 19
    Thu 20
    now

    Rapid Response

    Fri 14
    Sat 15
    Sun 16
    Mon 17
    Tue 18
    Wed 19
    Thu 20
    now
    Pan-OS Authentication Bypass - CVE-2025-0108
    Started 16 Feb 2025 14:39:01 (5 days ago), resolved 17 Feb 2025 11:59:59 (4 days ago)
    Incident without Impact
    Resolved
    Rapid Response

    Team AXON is aware of a publication about an Authentication Bypass flaw related to Palo Alto Networks, affecting PAN-OS management web interface. The flaw, identified as CVE-2025-0108, allows an unauthenticated attacker with network access to the management web interface to bypass authentication to the PAN-OS management web interface and invoke certain PHP scripts.

    A Proof-of-Concept exploit related to this vulnerability was published.

    While invoking these PHP scripts does not enable remote code execution, it can negatively impact the integrity and confidentiality of PAN-OS.

    to mitigate the risk, It is recommended to : - patch all the relevant PAN-OS devices. - restrict management interface access to only trusted internal IP addresses. - Threat Prevention subscription can be used to block attacks for this vulnerability by enabling Threat ID 510000 and 510001 (introduced in Applications and Threats content version 8943)

    The team is actively searching for evidence of exploitations of this vulnerability in our customers’ environments. In case of identification of impacted customers, they will be notified directly.

    Please don’t hesitate to contact us for further assistance or any relevant questions.

    Sincerely, Team Axon