{"document":{"category":"csaf_vex","csaf_version":"2.1","notes":[{"category":"summary","text":"Palo Alto Networks PSIRT provided VEX document. This document is autogenerated.","title":"PAN-OS: Authenticated Admin File Read Vulnerability in PAN-OS CLI"}],"publisher":{"category":"vendor","name":"Palo Alto Networks","namespace":"https://security.paloaltonetworks.com"},"title":"Palo Alto Networks PSIRT provided VEX document: CVE-2025-0115","distribution":{"text":"Copyright © 2024 Palo Alto Networks. All rights reserved.","tlp":{"label":"CLEAR","url":"https://www.first.org/tlp/"}},"tracking":{"current_release_date":"2026-04-11T00:51:37.967Z","generator":{"date":"2026-04-11T00:51:37.967Z","engine":{"name":"Vulnogram","version":"0.1.0-dev"}},"id":"CVE-2025-0115","initial_release_date":"2025-03-12T16:00:00.000Z","revision_history":[{"number":"1","date":"2025-03-12T09:00:00.000Z","summary":"Initial Publication"},{"number":"2","date":"2025-03-14T16:40:00.000Z","summary":"Added recommended mitigation measures"},{"number":"3","date":"2025-04-02T13:00:00.000Z","summary":"Updated unaffected software versions"},{"number":"4","date":"2025-06-12T09:25:00.000Z","summary":"Updated fix versions for PAN-OS 10.2"}],"status":"final","version":"1"}},"product_tree":{"branches":[{"name":"Palo Alto Networks","category":"vendor","branches":[{"name":"PAN-OS","category":"product_name","branches":[{"category":"product_version_range","name":"vers:generic/PAN-OS<11.2.3","product":{"name":"Palo Alto Networks PAN-OS","product_id":"PANW-PAN-OS-125"}},{"category":"product_version_range","name":"vers:generic/PAN-OS>=11.2.3","product":{"name":"Palo Alto Networks PAN-OS","product_id":"PANW-PAN-OS-125"}},{"category":"product_version_range","name":"vers:generic/PAN-OS<11.1.4-h17","product":{"name":"Palo Alto Networks PAN-OS","product_id":"PANW-PAN-OS-662"}},{"category":"product_version_range","name":"vers:generic/PAN-OS>=11.1.4-h17","product":{"name":"Palo Alto Networks PAN-OS","product_id":"PANW-PAN-OS-662"}},{"category":"product_version_range","name":"vers:generic/PAN-OS>=11.1.5","product":{"name":"Palo Alto Networks PAN-OS","product_id":"PANW-PAN-OS-138"}},{"category":"product_version_range","name":"vers:generic/PAN-OS<11.0.6","product":{"name":"Palo Alto Networks PAN-OS","product_id":"PANW-PAN-OS-139"}},{"category":"product_version_range","name":"vers:generic/PAN-OS>=11.0.6","product":{"name":"Palo Alto Networks PAN-OS","product_id":"PANW-PAN-OS-139"}},{"category":"product_version_range","name":"vers:generic/PAN-OS<10.2.10-h18","product":{"name":"Palo Alto Networks PAN-OS","product_id":"PANW-PAN-OS-698"}},{"category":"product_version_range","name":"vers:generic/PAN-OS>=10.2.11","product":{"name":"Palo Alto Networks PAN-OS","product_id":"PANW-PAN-OS-141"}},{"category":"product_version_range","name":"vers:generic/PAN-OS>=10.2.10-h18","product":{"name":"Palo Alto Networks PAN-OS","product_id":"PANW-PAN-OS-698"}},{"category":"product_version_range","name":"vers:generic/PAN-OS<10.1.14-h11","product":{"name":"Palo Alto Networks PAN-OS","product_id":"PANW-PAN-OS-657"}},{"category":"product_version_range","name":"vers:generic/PAN-OS>=10.1.14-h11","product":{"name":"Palo Alto Networks PAN-OS","product_id":"PANW-PAN-OS-657"}}]},{"name":"Cloud NGFW","category":"product_name","branches":[{"category":"product_version","name":"Cloud NGFW All","product":{"name":"Palo Alto Networks Cloud NGFW","product_id":"PANW-Cloud-NGFW-1"}}]},{"name":"Prisma Access","category":"product_name","branches":[{"category":"product_version","name":"Prisma Access All","product":{"name":"Palo Alto Networks Prisma Access","product_id":"PANW-Prisma-Access-1"}}]}]}]},"vulnerabilities":[{"cve":"CVE-2025-0115","product_status":{"fixed":["PANW-PAN-OS-125","PANW-PAN-OS-662","PANW-PAN-OS-138","PANW-PAN-OS-139","PANW-PAN-OS-141","PANW-PAN-OS-698","PANW-PAN-OS-657"],"known_affected":["PANW-PAN-OS-125","PANW-PAN-OS-662","PANW-PAN-OS-139","PANW-PAN-OS-698","PANW-PAN-OS-657"],"known_not_affected":["PANW-Cloud-NGFW-1","PANW-Prisma-Access-1"]},"notes":[{"category":"description","text":"A vulnerability in the Palo Alto Networks PAN-OS software enables an authenticated admin on the PAN-OS CLI to read arbitrary files.\n\nThe attacker must have network access to the management interface (web, SSH, console, or telnet) and successfully authenticate to exploit this issue. You can greatly reduce the risk of this issue by restricting access to the management interface to only trusted users and internal IP addresses according to our recommended critical deployment guidelines (https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431).\n\nThis issue does not affect Cloud NGFW or Prisma Access."}],"references":[{"category":"external","summary":"NVD - CVE-2025-0115","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-0115"},{"category":"self","summary":"Palo Alto Networks Security Advisory CVE-2025-0115","url":"https://security.paloaltonetworks.com/CVE-2025-0115"}],"threats":[{"category":"impact","description":"A vulnerability in the Palo Alto Networks PAN-OS software enables an authenticated admin on the PAN-OS CLI to read arbitrary files.\n\nThe attacker must have network access to the management interface (web, SSH, console, or telnet) and successfully authenticate to exploit this issue. You can greatly reduce the risk of this issue by restricting access to the management interface to only trusted users and internal IP addresses according to our recommended critical deployment guidelines (https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431).\n\nThis issue does not affect Cloud NGFW or Prisma Access."}],"scores":[{"cvss_v4":{"version":"4.0","attackVector":"LOCAL","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"LOW","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"NONE","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"NO","Recovery":"USER","valueDensity":"CONCENTRATED","vulnerabilityResponseEffort":"MODERATE","providerUrgency":"AMBER","exploitMaturity":"UNREPORTED","baseSeverity":"MEDIUM","baseScore":6.8,"threatSeverity":"MEDIUM","threatScore":4.3,"vectorString":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/AU:N/R:U/V:C/RE:M/U:Amber"},"products":["PANW-PAN-OS-125","PANW-PAN-OS-662","PANW-PAN-OS-139","PANW-PAN-OS-698","PANW-PAN-OS-657"]},{"cvss_v4":{"version":"4.0","attackVector":"LOCAL","attackComplexity":"LOW","attackRequirements":"PRESENT","privilegesRequired":"HIGH","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"NONE","subAvailabilityImpact":"NONE","Safety":"NOT_DEFINED","Automatable":"NO","Recovery":"USER","valueDensity":"CONCENTRATED","vulnerabilityResponseEffort":"MODERATE","providerUrgency":"GREEN","exploitMaturity":"UNREPORTED","baseSeverity":"MEDIUM","baseScore":5.6,"threatSeverity":"LOW","threatScore":1.6,"vectorString":"CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/AU:N/R:U/V:C/RE:M/U:Green"},"products":["PANW-PAN-OS-125","PANW-PAN-OS-662","PANW-PAN-OS-139","PANW-PAN-OS-698","PANW-PAN-OS-657"]}]}]}