{"document":{"category":"csaf_vex","csaf_version":"2.1","notes":[{"category":"summary","text":"Palo Alto Networks PSIRT provided VEX document. This document is autogenerated.","title":"Informational Bulletin: Impact of OSS CVEs in PAN-OS"}],"publisher":{"category":"vendor","name":"Palo Alto Networks","namespace":"https://security.paloaltonetworks.com"},"title":"Palo Alto Networks PSIRT provided VEX document: PAN-SA-2025-0006","distribution":{"text":"Copyright © 2024 Palo Alto Networks. All rights reserved.","tlp":{"label":"CLEAR","url":"https://www.first.org/tlp/"}},"tracking":{"current_release_date":"2026-04-11T00:26:13.498Z","generator":{"date":"2026-04-11T00:26:13.498Z","engine":{"name":"Vulnogram","version":"0.1.0-dev"}},"id":"PAN-SA-2025-0006","initial_release_date":"2025-02-12T17:00:00.000Z","revision_history":[{"number":"1","date":"2026-04-10T17:26:13.000Z","summary":"Initial release"}],"status":"final","version":"1"}},"product_tree":{"branches":[{"name":"Palo Alto Networks","category":"vendor","branches":[{"name":"PAN-OS","category":"product_name","branches":[{"category":"product_version","name":"PAN-OS All","product":{"name":"Palo Alto Networks PAN-OS","product_id":"PANW-PAN-OS-1"}}]}]}]},"vulnerabilities":[{"cve":"CVE-2016-4607","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as the underlying operating system components used by PAN-OS are not affected."}],"references":[{"category":"external","summary":"NVD - CVE-2016-4607","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4607"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2025-0006","url":"https://security.paloaltonetworks.com/PAN-SA-2025-0006"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as the underlying operating system components used by PAN-OS are not affected."}]},{"cve":"CVE-2016-4608","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as the underlying operating system components used by PAN-OS are not affected."}],"references":[{"category":"external","summary":"NVD - CVE-2016-4608","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4608"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2025-0006","url":"https://security.paloaltonetworks.com/PAN-SA-2025-0006"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as the underlying operating system components used by PAN-OS are not affected."}]},{"cve":"CVE-2016-4609","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as the underlying operating system components used by PAN-OS are not affected."}],"references":[{"category":"external","summary":"NVD - CVE-2016-4609","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4609"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2025-0006","url":"https://security.paloaltonetworks.com/PAN-SA-2025-0006"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as the underlying operating system components used by PAN-OS are not affected."}]},{"cve":"CVE-2016-4738","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as the underlying operating system components used by PAN-OS are not affected."}],"references":[{"category":"external","summary":"NVD - CVE-2016-4738","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4738"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2025-0006","url":"https://security.paloaltonetworks.com/PAN-SA-2025-0006"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as the underlying operating system components used by PAN-OS are not affected."}]},{"cve":"CVE-2018-1111","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as PAN-OS does not use NetworkManager."}],"references":[{"category":"external","summary":"NVD - CVE-2018-1111","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1111"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2025-0006","url":"https://security.paloaltonetworks.com/PAN-SA-2025-0006"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as PAN-OS does not use NetworkManager."}]},{"cve":"CVE-2018-14634","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as the underlying operating system components used by PAN-OS are not affected"}],"references":[{"category":"external","summary":"NVD - CVE-2018-14634","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-14634"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2025-0006","url":"https://security.paloaltonetworks.com/PAN-SA-2025-0006"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as the underlying operating system components used by PAN-OS are not affected"}]},{"cve":"CVE-2018-18653","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as this is an issue with Ubuntu."}],"references":[{"category":"external","summary":"NVD - CVE-2018-18653","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-18653"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2025-0006","url":"https://security.paloaltonetworks.com/PAN-SA-2025-0006"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as this is an issue with Ubuntu."}]},{"cve":"CVE-2019-0145","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as PAN-OS uses a fixed version of the i40e driver"}],"references":[{"category":"external","summary":"NVD - CVE-2019-0145","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-0145"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2025-0006","url":"https://security.paloaltonetworks.com/PAN-SA-2025-0006"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as PAN-OS uses a fixed version of the i40e driver"}]},{"cve":"CVE-2019-8331","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as PAN-OS does not use a vulnerable version of bootstrap"}],"references":[{"category":"external","summary":"NVD - CVE-2019-8331","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-8331"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2025-0006","url":"https://security.paloaltonetworks.com/PAN-SA-2025-0006"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as PAN-OS does not use a vulnerable version of bootstrap"}]},{"cve":"CVE-2020-0599","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as PAN-OS does not use the vulnerable processors."}],"references":[{"category":"external","summary":"NVD - CVE-2020-0599","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-0599"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2025-0006","url":"https://security.paloaltonetworks.com/PAN-SA-2025-0006"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as PAN-OS does not use the vulnerable processors."}]},{"cve":"CVE-2020-14343","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as the underlying operating system components used by PAN-OS as not affected."}],"references":[{"category":"external","summary":"NVD - CVE-2020-14343","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-14343"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2025-0006","url":"https://security.paloaltonetworks.com/PAN-SA-2025-0006"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as the underlying operating system components used by PAN-OS as not affected."}]},{"cve":"CVE-2020-14779","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as the Java in PAN-OS comes from ElasticSearch, and ElasticSearch is not affected."}],"references":[{"category":"external","summary":"NVD - CVE-2020-14779","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-14779"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2025-0006","url":"https://security.paloaltonetworks.com/PAN-SA-2025-0006"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as the Java in PAN-OS comes from ElasticSearch, and ElasticSearch is not affected."}]},{"cve":"CVE-2020-27844","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as the openjpeg2 implementation used in PAN-OS is not affected."}],"references":[{"category":"external","summary":"NVD - CVE-2020-27844","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-27844"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2025-0006","url":"https://security.paloaltonetworks.com/PAN-SA-2025-0006"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as the openjpeg2 implementation used in PAN-OS is not affected."}]},{"cve":"CVE-2020-29569","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as CONFIG_XEN_BLKDEV_BACKEND is not enabled on PAN-OS."}],"references":[{"category":"external","summary":"NVD - CVE-2020-29569","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-29569"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2025-0006","url":"https://security.paloaltonetworks.com/PAN-SA-2025-0006"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as CONFIG_XEN_BLKDEV_BACKEND is not enabled on PAN-OS."}]},{"cve":"CVE-2021-3618","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as the NGINX used in PAN-OS is not built with mail_ssl_module."}],"references":[{"category":"external","summary":"NVD - CVE-2021-3618","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3618"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2025-0006","url":"https://security.paloaltonetworks.com/PAN-SA-2025-0006"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as the NGINX used in PAN-OS is not built with mail_ssl_module."}]},{"cve":"CVE-2021-3711","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as PAN-OS does not use the vulnerable OpenSSL versions."}],"references":[{"category":"external","summary":"NVD - CVE-2021-3711","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3711"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2025-0006","url":"https://security.paloaltonetworks.com/PAN-SA-2025-0006"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as PAN-OS does not use the vulnerable OpenSSL versions."}]},{"cve":"CVE-2021-21315","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as PAN-OS does not use the vulnerable package."}],"references":[{"category":"external","summary":"NVD - CVE-2021-21315","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-21315"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2025-0006","url":"https://security.paloaltonetworks.com/PAN-SA-2025-0006"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as PAN-OS does not use the vulnerable package."}]},{"cve":"CVE-2021-27853","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected since it does not offer Layer 2 network filtering capabilities that take action based on analysis of Layer 2 traffic, such as RA Guard, Dynamic ARP Inspection, DHCP Security, or Secure IPv6 Neighbor Discovery."}],"references":[{"category":"external","summary":"NVD - CVE-2021-27853","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-27853"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2025-0006","url":"https://security.paloaltonetworks.com/PAN-SA-2025-0006"}],"threats":[{"category":"impact","description":"PAN-OS is not affected since it does not offer Layer 2 network filtering capabilities that take action based on analysis of Layer 2 traffic, such as RA Guard, Dynamic ARP Inspection, DHCP Security, or Secure IPv6 Neighbor Discovery."}]},{"cve":"CVE-2021-27854","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected since it does not offer Layer 2 network filtering capabilities that take action based on analysis of Layer 2 traffic, such as RA Guard, Dynamic ARP Inspection, DHCP Security, or Secure IPv6 Neighbor Discovery."}],"references":[{"category":"external","summary":"NVD - CVE-2021-27854","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-27854"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2025-0006","url":"https://security.paloaltonetworks.com/PAN-SA-2025-0006"}],"threats":[{"category":"impact","description":"PAN-OS is not affected since it does not offer Layer 2 network filtering capabilities that take action based on analysis of Layer 2 traffic, such as RA Guard, Dynamic ARP Inspection, DHCP Security, or Secure IPv6 Neighbor Discovery."}]},{"cve":"CVE-2021-27861","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected since it does not offer Layer 2 network filtering capabilities that take action based on analysis of Layer 2 traffic, such as RA Guard, Dynamic ARP Inspection, DHCP Security, or Secure IPv6 Neighbor Discovery."}],"references":[{"category":"external","summary":"NVD - CVE-2021-27861","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-27861"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2025-0006","url":"https://security.paloaltonetworks.com/PAN-SA-2025-0006"}],"threats":[{"category":"impact","description":"PAN-OS is not affected since it does not offer Layer 2 network filtering capabilities that take action based on analysis of Layer 2 traffic, such as RA Guard, Dynamic ARP Inspection, DHCP Security, or Secure IPv6 Neighbor Discovery."}]},{"cve":"CVE-2021-27862","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected since it does not offer Layer 2 network filtering capabilities that take action based on analysis of Layer 2 traffic, such as RA Guard, Dynamic ARP Inspection, DHCP Security, or Secure IPv6 Neighbor Discovery."}],"references":[{"category":"external","summary":"NVD - CVE-2021-27862","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-27862"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2025-0006","url":"https://security.paloaltonetworks.com/PAN-SA-2025-0006"}],"threats":[{"category":"impact","description":"PAN-OS is not affected since it does not offer Layer 2 network filtering capabilities that take action based on analysis of Layer 2 traffic, such as RA Guard, Dynamic ARP Inspection, DHCP Security, or Secure IPv6 Neighbor Discovery."}]},{"cve":"CVE-2022-2097","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as the \"c_rehash\" script affected by this CVE is not shipped with PAN-OS."}],"references":[{"category":"external","summary":"NVD - CVE-2022-2097","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-2097"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2025-0006","url":"https://security.paloaltonetworks.com/PAN-SA-2025-0006"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as the \"c_rehash\" script affected by this CVE is not shipped with PAN-OS."}]},{"cve":"CVE-2022-22816","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as PAN-OS does not process untrusted images with pillow."}],"references":[{"category":"external","summary":"NVD - CVE-2022-22816","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-22816"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2025-0006","url":"https://security.paloaltonetworks.com/PAN-SA-2025-0006"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as PAN-OS does not process untrusted images with pillow."}]},{"cve":"CVE-2022-40303","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as the libxml2 used in PAN-OS is not compiled with XML_PARSE_HUGE."}],"references":[{"category":"external","summary":"NVD - CVE-2022-40303","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-40303"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2025-0006","url":"https://security.paloaltonetworks.com/PAN-SA-2025-0006"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as the libxml2 used in PAN-OS is not compiled with XML_PARSE_HUGE."}]},{"cve":"CVE-2022-41723","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as PAN-OS does not use http2 server"}],"references":[{"category":"external","summary":"NVD - CVE-2022-41723","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41723"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2025-0006","url":"https://security.paloaltonetworks.com/PAN-SA-2025-0006"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as PAN-OS does not use http2 server"}]},{"cve":"CVE-2022-41741","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as the NGINX used in PAN-OS is not built with ngx_http_mp4_module"}],"references":[{"category":"external","summary":"NVD - CVE-2022-41741","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41741"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2025-0006","url":"https://security.paloaltonetworks.com/PAN-SA-2025-0006"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as the NGINX used in PAN-OS is not built with ngx_http_mp4_module"}]},{"cve":"CVE-2022-41742","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as the NGINX used in PAN-OS is not built with ngx_http_mp4_module"}],"references":[{"category":"external","summary":"NVD - CVE-2022-41742","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-41742"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2025-0006","url":"https://security.paloaltonetworks.com/PAN-SA-2025-0006"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as the NGINX used in PAN-OS is not built with ngx_http_mp4_module"}]},{"cve":"CVE-2023-3247","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as PAN-OS does not support SOAP requests."}],"references":[{"category":"external","summary":"NVD - CVE-2023-3247","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-3247"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2025-0006","url":"https://security.paloaltonetworks.com/PAN-SA-2025-0006"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as PAN-OS does not support SOAP requests."}]},{"cve":"CVE-2023-38408","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as PAN-OS does not use the ssh-agent feature of OpenSSH."}],"references":[{"category":"external","summary":"NVD - CVE-2023-38408","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-38408"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2025-0006","url":"https://security.paloaltonetworks.com/PAN-SA-2025-0006"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as PAN-OS does not use the ssh-agent feature of OpenSSH."}]},{"cve":"CVE-2023-44466","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as the kernel used in PAN-OS does not support v2 messages."}],"references":[{"category":"external","summary":"NVD - CVE-2023-44466","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-44466"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2025-0006","url":"https://security.paloaltonetworks.com/PAN-SA-2025-0006"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as the kernel used in PAN-OS does not support v2 messages."}]},{"cve":"CVE-2023-50781","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as the m2crypto implementation used by PAN-OS is not affected."}],"references":[{"category":"external","summary":"NVD - CVE-2023-50781","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-50781"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2025-0006","url":"https://security.paloaltonetworks.com/PAN-SA-2025-0006"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as the m2crypto implementation used by PAN-OS is not affected."}]},{"cve":"CVE-2023-50782","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as PAN-OS does not use PKCSv1.15 for RSA decryption."}],"references":[{"category":"external","summary":"NVD - CVE-2023-50782","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-50782"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2025-0006","url":"https://security.paloaltonetworks.com/PAN-SA-2025-0006"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as PAN-OS does not use PKCSv1.15 for RSA decryption."}]},{"cve":"CVE-2024-6409","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as PAN-OS does not have vulnerable openssh component."}],"references":[{"category":"external","summary":"NVD - CVE-2024-6409","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-6409"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2025-0006","url":"https://security.paloaltonetworks.com/PAN-SA-2025-0006"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as PAN-OS does not have vulnerable openssh component."}]},{"cve":"CVE-2024-12084","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as the underlying operating system components used by PAN-OS as not affected."}],"references":[{"category":"external","summary":"NVD - CVE-2024-12084","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-12084"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2025-0006","url":"https://security.paloaltonetworks.com/PAN-SA-2025-0006"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as the underlying operating system components used by PAN-OS as not affected."}]},{"cve":"CVE-2024-38472","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as this CVE only affects Windows systems."}],"references":[{"category":"external","summary":"NVD - CVE-2024-38472","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38472"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2025-0006","url":"https://security.paloaltonetworks.com/PAN-SA-2025-0006"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as this CVE only affects Windows systems."}]},{"cve":"CVE-2024-38475","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as PAN-OS does not use the vulnerable component mod_rewrite."}],"references":[{"category":"external","summary":"NVD - CVE-2024-38475","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38475"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2025-0006","url":"https://security.paloaltonetworks.com/PAN-SA-2025-0006"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as PAN-OS does not use the vulnerable component mod_rewrite."}]},{"cve":"CVE-2025-26465","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as PAN-OS does not use VerifyHostKeyDNSfeature of OpenSSH."}],"references":[{"category":"external","summary":"NVD - CVE-2025-26465","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-26465"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2025-0006","url":"https://security.paloaltonetworks.com/PAN-SA-2025-0006"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as PAN-OS does not use VerifyHostKeyDNSfeature of OpenSSH."}]},{"cve":"CVE-2025-32728","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as PAN-OS does not use the DisableForwarding parameter."}],"references":[{"category":"external","summary":"NVD - CVE-2025-32728","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-32728"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2025-0006","url":"https://security.paloaltonetworks.com/PAN-SA-2025-0006"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as PAN-OS does not use the DisableForwarding parameter."}]},{"cve":"GHSA-56pw-mpj4-fxww","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as PAN-OS does not process untrusted images with pillow."}],"references":[{"category":"external","summary":"NVD - GHSA-56pw-mpj4-fxww","url":"https://nvd.nist.gov/vuln/detail/GHSA-56pw-mpj4-fxww"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2025-0006","url":"https://security.paloaltonetworks.com/PAN-SA-2025-0006"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as PAN-OS does not process untrusted images with pillow."}]},{"cve":"GHSA-jgpv-4h4c-xhw3","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":""}],"references":[{"category":"external","summary":"NVD - GHSA-jgpv-4h4c-xhw3","url":"https://nvd.nist.gov/vuln/detail/GHSA-jgpv-4h4c-xhw3"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2025-0006","url":"https://security.paloaltonetworks.com/PAN-SA-2025-0006"}],"threats":[{"category":"impact","description":""}]},{"cve":"PRISMA-2021-0010","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as PAN-OS does not process untrusted images with pillow."}],"references":[{"category":"external","summary":"NVD - PRISMA-2021-0010","url":"https://nvd.nist.gov/vuln/detail/PRISMA-2021-0010"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2025-0006","url":"https://security.paloaltonetworks.com/PAN-SA-2025-0006"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as PAN-OS does not process untrusted images with pillow."}]},{"cve":"PRISMA-2021-0015","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as PAN-OS does not process untrusted images with pillow."}],"references":[{"category":"external","summary":"NVD - PRISMA-2021-0015","url":"https://nvd.nist.gov/vuln/detail/PRISMA-2021-0015"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2025-0006","url":"https://security.paloaltonetworks.com/PAN-SA-2025-0006"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as PAN-OS does not process untrusted images with pillow."}]},{"cve":"PRISMA-2022-0168","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as PAN-OS does not allow users to download packages using pip."}],"references":[{"category":"external","summary":"NVD - PRISMA-2022-0168","url":"https://nvd.nist.gov/vuln/detail/PRISMA-2022-0168"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2025-0006","url":"https://security.paloaltonetworks.com/PAN-SA-2025-0006"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as PAN-OS does not allow users to download packages using pip."}]},{"cve":"CVE-2015-5312","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as PAN-OS does not have vulnerable versions of libxml2 library."}],"references":[{"category":"external","summary":"NVD - CVE-2015-5312","url":"https://nvd.nist.gov/vuln/detail/CVE-2015-5312"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2025-0006","url":"https://security.paloaltonetworks.com/PAN-SA-2025-0006"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as PAN-OS does not have vulnerable versions of libxml2 library."}]},{"cve":"CVE-2025-61984","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as PAN-OS does not use the ProxyCommand option in the SSH client configuration."}],"references":[{"category":"external","summary":"NVD - CVE-2025-61984","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-61984"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2025-0006","url":"https://security.paloaltonetworks.com/PAN-SA-2025-0006"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as PAN-OS does not use the ProxyCommand option in the SSH client configuration."}]},{"cve":"CVE-2025-61985","product_status":{"known_not_affected":["PANW-PAN-OS-1"]},"notes":[{"category":"description","text":"PAN-OS is not affected as PAN-OS does not use the ProxyCommand option in the SSH client configuration."}],"references":[{"category":"external","summary":"NVD - CVE-2025-61985","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-61985"},{"category":"self","summary":"Palo Alto Networks Security Advisory PAN-SA-2025-0006","url":"https://security.paloaltonetworks.com/PAN-SA-2025-0006"}],"threats":[{"category":"impact","description":"PAN-OS is not affected as PAN-OS does not use the ProxyCommand option in the SSH client configuration."}]}]}