SB2025021806 - Privilege escalation in PAN-OS OpenConfig Plugin 



SB2025021806 - Privilege escalation in PAN-OS OpenConfig Plugin

Published: February 18, 2025

Security Bulletin ID SB2025021806
Severity
Low
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) OS Command Injection (CVE-ID: CVE-2025-0110)

The vulnerability allows a remote user to execute arbitrary shell commands on the target system.

The vulnerability exists due to improper input validation. A remote authenticated administrator with the ability to make gNMI requests to the PAN-OS management web interface can bypass system restrictions and run arbitrary commands as the “__openconfig” user by sending specially crafted requests to port 9339/tcp.


Remediation

Install update from vendor's website.