
Rapid Response Status
Real-time updates of Rapid Response issues and outages
Rapid Response status is Operational
Rapid Response
Active Incidents
No active incidents
Recently Resolved Incidents
Team AXON is aware of a publication about an Authentication Bypass flaw related to Palo Alto Networks, affecting PAN-OS management web interface. The flaw, identified as CVE-2025-0108, allows an unauthenticated attacker with network access to the management web interface to bypass authentication to the PAN-OS management web interface and invoke certain PHP scripts.
A Proof-of-Concept exploit related to this vulnerability was published.
While invoking these PHP scripts does not enable remote code execution, it can negatively impact the integrity and confidentiality of PAN-OS.
to mitigate the risk, It is recommended to : - patch all the relevant PAN-OS devices. - restrict management interface access to only trusted internal IP addresses. - Threat Prevention subscription can be used to block attacks for this vulnerability by enabling Threat ID 510000 and 510001 (introduced in Applications and Threats content version 8943)
The team is actively searching for evidence of exploitations of this vulnerability in our customers’ environments. In case of identification of impacted customers, they will be notified directly.
Please don’t hesitate to contact us for further assistance or any relevant questions.
Sincerely, Team Axon
Rapid Response Outage Survival Guide
Rapid Response Components
Rapid Response
Team AXON is aware of a publication about an Authentication Bypass flaw related to Palo Alto Networks, affecting PAN-OS management web interface. The flaw, identified as CVE-2025-0108, allows an unauthenticated attacker with network access to the management web interface to bypass authentication to the PAN-OS management web interface and invoke certain PHP scripts.
A Proof-of-Concept exploit related to this vulnerability was published.
While invoking these PHP scripts does not enable remote code execution, it can negatively impact the integrity and confidentiality of PAN-OS.
to mitigate the risk, It is recommended to : - patch all the relevant PAN-OS devices. - restrict management interface access to only trusted internal IP addresses. - Threat Prevention subscription can be used to block attacks for this vulnerability by enabling Threat ID 510000 and 510001 (introduced in Applications and Threats content version 8943)
The team is actively searching for evidence of exploitations of this vulnerability in our customers’ environments. In case of identification of impacted customers, they will be notified directly.
Please don’t hesitate to contact us for further assistance or any relevant questions.
Sincerely, Team Axon