CVE-2025-0116
Vulnerability from cvelistv5
Published
2025-03-12 18:34
Modified
2025-03-17 23:58
EPSS score ?
0.03% (0.06242)
Summary
A Denial of Service (DoS) vulnerability in Palo Alto Networks PAN-OS software causes the firewall to unexpectedly reboot when processing a specially crafted LLDP frame sent by an unauthenticated adjacent attacker. Repeated attempts to initiate this condition causes the firewall to enter maintenance mode. This issue does not apply to Cloud NGFWs or Prisma Access software.
Impacted products
Vendor Product Version
Palo Alto Networks PAN-OS Version: 11.2.0   < 11.2.5
Version: 11.1.0   < 11.1.8
Version: 10.2.0   < 10.2.14
Version: 10.1.0   < 10.1.14-h11
    cpe:2.3:o:paloaltonetworks:pan-os:11.2.4:*:*:*:*:*:*:*
    cpe:2.3:o:paloaltonetworks:pan-os:11.2.3:*:*:*:*:*:*:*
    cpe:2.3:o:paloaltonetworks:pan-os:11.2.2:*:*:*:*:*:*:*
    cpe:2.3:o:paloaltonetworks:pan-os:11.2.1:*:*:*:*:*:*:*
    cpe:2.3:o:paloaltonetworks:pan-os:11.2.0:*:*:*:*:*:*:*
    cpe:2.3:o:paloaltonetworks:pan-os:11.1.6:*:*:*:*:*:*:*
    cpe:2.3:o:paloaltonetworks:pan-os:11.1.5:*:*:*:*:*:*:*
    cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:*:*:*:*:*:*:*
    cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:*:*:*:*:*:*:*
    cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:*:*:*:*:*:*:*
    cpe:2.3:o:paloaltonetworks:pan-os:11.1.1:*:*:*:*:*:*:*
    cpe:2.3:o:paloaltonetworks:pan-os:11.1.0:*:*:*:*:*:*:*
    cpe:2.3:o:paloaltonetworks:pan-os:10.2.13:h4:*:*:*:*:*:*
    cpe:2.3:o:paloaltonetworks:pan-os:10.2.13:h3:*:*:*:*:*:*
    cpe:2.3:o:paloaltonetworks:pan-os:10.2.13:h2:*:*:*:*:*:*
    cpe:2.3:o:paloaltonetworks:pan-os:10.2.13:h1:*:*:*:*:*:*
    cpe:2.3:o:paloaltonetworks:pan-os:10.2.13:-:*:*:*:*:*:*
    cpe:2.3:o:paloaltonetworks:pan-os:10.2.12:*:*:*:*:*:*:*
    cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:*:*:*:*:*:*:*
    cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:*:*:*:*:*:*:*
    cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:*:*:*:*:*:*:*
    cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:*:*:*:*:*:*:*
    cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:*:*:*:*:*:*:*
    cpe:2.3:o:paloaltonetworks:pan-os:10.2.6:*:*:*:*:*:*:*
    cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:*:*:*:*:*:*:*
    cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:*:*:*:*:*:*:*
    cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:*:*:*:*:*:*:*
    cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:*:*:*:*:*:*:*
    cpe:2.3:o:paloaltonetworks:pan-os:10.2.1:*:*:*:*:*:*:*
    cpe:2.3:o:paloaltonetworks:pan-os:10.2.0:*:*:*:*:*:*:*
    cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h10:*:*:*:*:*:*
    cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h9:*:*:*:*:*:*
    cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h8:*:*:*:*:*:*
    cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h7:*:*:*:*:*:*
    cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h6:*:*:*:*:*:*
    cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h5:*:*:*:*:*:*
    cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h4:*:*:*:*:*:*
    cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h3:*:*:*:*:*:*
    cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h2:*:*:*:*:*:*
    cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h1:*:*:*:*:*:*
    cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:-:*:*:*:*:*:*
    cpe:2.3:o:paloaltonetworks:pan-os:10.1.13:*:*:*:*:*:*:*
    cpe:2.3:o:paloaltonetworks:pan-os:10.1.12:*:*:*:*:*:*:*
    cpe:2.3:o:paloaltonetworks:pan-os:10.1.11:*:*:*:*:*:*:*
    cpe:2.3:o:paloaltonetworks:pan-os:10.1.10:*:*:*:*:*:*:*
    cpe:2.3:o:paloaltonetworks:pan-os:10.1.9:*:*:*:*:*:*:*
    cpe:2.3:o:paloaltonetworks:pan-os:10.1.8:*:*:*:*:*:*:*
    cpe:2.3:o:paloaltonetworks:pan-os:10.1.7:*:*:*:*:*:*:*
    cpe:2.3:o:paloaltonetworks:pan-os:10.1.6:*:*:*:*:*:*:*
    cpe:2.3:o:paloaltonetworks:pan-os:10.1.5:*:*:*:*:*:*:*
    cpe:2.3:o:paloaltonetworks:pan-os:10.1.4:*:*:*:*:*:*:*
    cpe:2.3:o:paloaltonetworks:pan-os:10.1.3:*:*:*:*:*:*:*
    cpe:2.3:o:paloaltonetworks:pan-os:10.1.2:*:*:*:*:*:*:*
    cpe:2.3:o:paloaltonetworks:pan-os:10.1.1:*:*:*:*:*:*:*
    cpe:2.3:o:paloaltonetworks:pan-os:10.1.0:*:*:*:*:*:*:*
Create a notification for this product.
   Palo Alto Networks Cloud NGFW Patch: All
Create a notification for this product.
   Palo Alto Networks Prisma Access Patch: All
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2025-0116",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-03-12T19:21:54.917072Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-03-12T19:22:05.233Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               cpes: [
                  "cpe:2.3:o:paloaltonetworks:pan-os:11.2.4:*:*:*:*:*:*:*",
                  "cpe:2.3:o:paloaltonetworks:pan-os:11.2.3:*:*:*:*:*:*:*",
                  "cpe:2.3:o:paloaltonetworks:pan-os:11.2.2:*:*:*:*:*:*:*",
                  "cpe:2.3:o:paloaltonetworks:pan-os:11.2.1:*:*:*:*:*:*:*",
                  "cpe:2.3:o:paloaltonetworks:pan-os:11.2.0:*:*:*:*:*:*:*",
                  "cpe:2.3:o:paloaltonetworks:pan-os:11.1.6:*:*:*:*:*:*:*",
                  "cpe:2.3:o:paloaltonetworks:pan-os:11.1.5:*:*:*:*:*:*:*",
                  "cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:*:*:*:*:*:*:*",
                  "cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:*:*:*:*:*:*:*",
                  "cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:*:*:*:*:*:*:*",
                  "cpe:2.3:o:paloaltonetworks:pan-os:11.1.1:*:*:*:*:*:*:*",
                  "cpe:2.3:o:paloaltonetworks:pan-os:11.1.0:*:*:*:*:*:*:*",
                  "cpe:2.3:o:paloaltonetworks:pan-os:10.2.13:h4:*:*:*:*:*:*",
                  "cpe:2.3:o:paloaltonetworks:pan-os:10.2.13:h3:*:*:*:*:*:*",
                  "cpe:2.3:o:paloaltonetworks:pan-os:10.2.13:h2:*:*:*:*:*:*",
                  "cpe:2.3:o:paloaltonetworks:pan-os:10.2.13:h1:*:*:*:*:*:*",
                  "cpe:2.3:o:paloaltonetworks:pan-os:10.2.13:-:*:*:*:*:*:*",
                  "cpe:2.3:o:paloaltonetworks:pan-os:10.2.12:*:*:*:*:*:*:*",
                  "cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:*:*:*:*:*:*:*",
                  "cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:*:*:*:*:*:*:*",
                  "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:*:*:*:*:*:*:*",
                  "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:*:*:*:*:*:*:*",
                  "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:*:*:*:*:*:*:*",
                  "cpe:2.3:o:paloaltonetworks:pan-os:10.2.6:*:*:*:*:*:*:*",
                  "cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:*:*:*:*:*:*:*",
                  "cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:*:*:*:*:*:*:*",
                  "cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:*:*:*:*:*:*:*",
                  "cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:*:*:*:*:*:*:*",
                  "cpe:2.3:o:paloaltonetworks:pan-os:10.2.1:*:*:*:*:*:*:*",
                  "cpe:2.3:o:paloaltonetworks:pan-os:10.2.0:*:*:*:*:*:*:*",
                  "cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h10:*:*:*:*:*:*",
                  "cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h9:*:*:*:*:*:*",
                  "cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h8:*:*:*:*:*:*",
                  "cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h7:*:*:*:*:*:*",
                  "cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h6:*:*:*:*:*:*",
                  "cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h5:*:*:*:*:*:*",
                  "cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h4:*:*:*:*:*:*",
                  "cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h3:*:*:*:*:*:*",
                  "cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h2:*:*:*:*:*:*",
                  "cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h1:*:*:*:*:*:*",
                  "cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:-:*:*:*:*:*:*",
                  "cpe:2.3:o:paloaltonetworks:pan-os:10.1.13:*:*:*:*:*:*:*",
                  "cpe:2.3:o:paloaltonetworks:pan-os:10.1.12:*:*:*:*:*:*:*",
                  "cpe:2.3:o:paloaltonetworks:pan-os:10.1.11:*:*:*:*:*:*:*",
                  "cpe:2.3:o:paloaltonetworks:pan-os:10.1.10:*:*:*:*:*:*:*",
                  "cpe:2.3:o:paloaltonetworks:pan-os:10.1.9:*:*:*:*:*:*:*",
                  "cpe:2.3:o:paloaltonetworks:pan-os:10.1.8:*:*:*:*:*:*:*",
                  "cpe:2.3:o:paloaltonetworks:pan-os:10.1.7:*:*:*:*:*:*:*",
                  "cpe:2.3:o:paloaltonetworks:pan-os:10.1.6:*:*:*:*:*:*:*",
                  "cpe:2.3:o:paloaltonetworks:pan-os:10.1.5:*:*:*:*:*:*:*",
                  "cpe:2.3:o:paloaltonetworks:pan-os:10.1.4:*:*:*:*:*:*:*",
                  "cpe:2.3:o:paloaltonetworks:pan-os:10.1.3:*:*:*:*:*:*:*",
                  "cpe:2.3:o:paloaltonetworks:pan-os:10.1.2:*:*:*:*:*:*:*",
                  "cpe:2.3:o:paloaltonetworks:pan-os:10.1.1:*:*:*:*:*:*:*",
                  "cpe:2.3:o:paloaltonetworks:pan-os:10.1.0:*:*:*:*:*:*:*",
               ],
               defaultStatus: "unaffected",
               product: "PAN-OS",
               vendor: "Palo Alto Networks",
               versions: [
                  {
                     changes: [
                        {
                           at: "11.2.5",
                           status: "unaffected",
                        },
                     ],
                     lessThan: "11.2.5",
                     status: "affected",
                     version: "11.2.0",
                     versionType: "custom",
                  },
                  {
                     changes: [
                        {
                           at: "11.1.8",
                           status: "unaffected",
                        },
                     ],
                     lessThan: "11.1.8",
                     status: "affected",
                     version: "11.1.0",
                     versionType: "custom",
                  },
                  {
                     changes: [
                        {
                           at: "10.2.14",
                           status: "unaffected",
                        },
                        {
                           at: "10.2.13-h5",
                           status: "unaffected",
                        },
                     ],
                     lessThan: "10.2.14",
                     status: "affected",
                     version: "10.2.0",
                     versionType: "custom",
                  },
                  {
                     changes: [
                        {
                           at: "10.1.14-h11",
                           status: "unaffected",
                        },
                     ],
                     lessThan: "10.1.14-h11",
                     status: "affected",
                     version: "10.1.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               product: "Cloud NGFW",
               vendor: "Palo Alto Networks",
               versions: [
                  {
                     status: "unaffected",
                     version: "All",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               product: "Prisma Access",
               vendor: "Palo Alto Networks",
               versions: [
                  {
                     status: "unaffected",
                     version: "All",
                     versionType: "custom",
                  },
               ],
            },
         ],
         configurations: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "To be vulnerable, all of the following conditions must be true:<br><ol><li>You must have enabled LLDP in your PAN-OS software to be vulnerable to this issue. You can verify whether you have LLDP enabled by following these steps in your web interface:<ol><li>Select <b>Network</b> &gt; <b>LLDP</b>.<br></li><li>In the LLDP General settings, verify whether LLDP is enabled (checked).</li></ol></li><li>LLDP must be enabled on at least one network interface. You&nbsp;can verify whether you have LLDP enabled on an interface by following these steps in your web interface:</li><ol><li>Select <b>Network &gt; LLDP.<br></b></li><li>Verify if any interfaces are listed</li><li>Verify if for any listed interface LLDP is enabled (checked)&nbsp;</li></ol><li>The LLDP profile associated with the an interface must have the \"Mode\" configured to \"transmit-receive\" or \"receive-only\". You can verify the \"Mode\" in your LLDP profile&nbsp;by following these steps in your web interface:</li><ol><li>Select <b>Network &gt; LLDP.</b><br></li><li> For any interfaces where LLDP is enabled, find the profile associated with it.<br></li><li>Select&nbsp;<b>Network &gt; Network Profiles &gt; LLDP Profile</b></li><li>Select the profile used with the interface</li><li>Verify if the \"Mode\" is set to&nbsp;\"transmit-receive\" or \"receive-only\"&nbsp;</li></ol></ol>",
                  },
               ],
               value: "To be vulnerable, all of the following conditions must be true:\n  *  You must have enabled LLDP in your PAN-OS software to be vulnerable to this issue. You can verify whether you have LLDP enabled by following these steps in your web interface:  *  Select Network > LLDP.\n\n  *  In the LLDP General settings, verify whether LLDP is enabled (checked).\n\n  *  LLDP must be enabled on at least one network interface. You can verify whether you have LLDP enabled on an interface by following these steps in your web interface:\n  *  Select Network > LLDP.\n\n  *  Verify if any interfaces are listed\n  *  Verify if for any listed interface LLDP is enabled (checked) \n  *  The LLDP profile associated with the an interface must have the \"Mode\" configured to \"transmit-receive\" or \"receive-only\". You can verify the \"Mode\" in your LLDP profile by following these steps in your web interface:\n  *  Select Network > LLDP.\n\n  *   For any interfaces where LLDP is enabled, find the profile associated with it.\n\n  *  Select Network > Network Profiles > LLDP Profile\n  *  Select the profile used with the interface\n  *  Verify if the \"Mode\" is set to \"transmit-receive\" or \"receive-only\"",
            },
         ],
         credits: [
            {
               lang: "en",
               type: "finder",
               value: "an external reporter",
            },
         ],
         datePublic: "2025-03-12T16:00:00.000Z",
         descriptions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "A Denial of Service (DoS) vulnerability in Palo Alto Networks PAN-OS software causes the firewall to unexpectedly reboot when processing a specially crafted LLDP frame sent by an unauthenticated adjacent attacker. Repeated attempts to initiate this condition causes the firewall to enter maintenance mode.<br><br>This issue does not apply to Cloud NGFWs or Prisma Access software.",
                  },
               ],
               value: "A Denial of Service (DoS) vulnerability in Palo Alto Networks PAN-OS software causes the firewall to unexpectedly reboot when processing a specially crafted LLDP frame sent by an unauthenticated adjacent attacker. Repeated attempts to initiate this condition causes the firewall to enter maintenance mode.\n\nThis issue does not apply to Cloud NGFWs or Prisma Access software.",
            },
         ],
         exploits: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "Palo Alto Networks is not aware of any malicious exploitation of this issue.",
                  },
               ],
               value: "Palo Alto Networks is not aware of any malicious exploitation of this issue.",
            },
         ],
         impacts: [
            {
               capecId: "CAPEC-153",
               descriptions: [
                  {
                     lang: "en",
                     value: "CAPEC-153 Input Data Manipulation",
                  },
               ],
            },
         ],
         metrics: [
            {
               cvssV4_0: {
                  Automatable: "NO",
                  Recovery: "USER",
                  Safety: "NOT_DEFINED",
                  attackComplexity: "LOW",
                  attackRequirements: "NONE",
                  attackVector: "ADJACENT",
                  baseScore: 6.8,
                  baseSeverity: "MEDIUM",
                  privilegesRequired: "NONE",
                  providerUrgency: "AMBER",
                  subAvailabilityImpact: "NONE",
                  subConfidentialityImpact: "NONE",
                  subIntegrityImpact: "NONE",
                  userInteraction: "ACTIVE",
                  valueDensity: "CONCENTRATED",
                  vectorString: "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/AU:N/R:U/V:C/RE:M/U:Amber",
                  version: "4.0",
                  vulnAvailabilityImpact: "HIGH",
                  vulnConfidentialityImpact: "NONE",
                  vulnIntegrityImpact: "NONE",
                  vulnerabilityResponseEffort: "MODERATE",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-754",
                     description: "CWE-754 Improper Check for Unusual or Exceptional Conditions",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-03-17T23:58:12.045Z",
            orgId: "d6c1279f-00f6-4ef7-9217-f89ffe703ec0",
            shortName: "palo_alto",
         },
         references: [
            {
               tags: [
                  "vendor-advisory",
               ],
               url: "https://security.paloaltonetworks.com/CVE-2025-0116",
            },
         ],
         solutions: [
            {
               lang: "eng",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "<table><thead><tr><th>Version<br></th><th>Minor Version<br></th><th>Suggested Solution<br></th></tr></thead><tbody><tr><td>PAN-OS 11.2<br></td><td>11.2.0 through 11.2.4<br></td><td>Upgrade to 11.2.5 or later<br></td></tr><tr><td>PAN-OS 11.1</td><td>11.1.0 through 11.1.7<br></td><td>Upgrade to 11.1.8 or later<br></td></tr><tr><td>PAN-OS 11.0 (EoL)</td><td>&nbsp;</td><td>Upgrade to a supported fixed version</td></tr><tr><td>PAN-OS 10.2</td><td>10.2.13</td><td>Upgrade to 10.2.13-h5 or 10.2.14 or later<br></td></tr><tr><td>&nbsp;</td><td>10.2.0 through 10.2.13<br></td><td>Upgrade to 10.2.14 or later<br></td></tr><tr><td>PAN-OS 10.1<br></td><td>10.1.0 through 10.1.14</td><td>Upgrade to 10.1.14-h11 or later</td></tr><tr><td>All other older<br>unsupported<br>PAN-OS versions</td><td>&nbsp;</td><td>Upgrade to a supported fixed version.</td></tr></tbody></table><br><p></p>",
                  },
               ],
               value: "Version\nMinor Version\nSuggested Solution\nPAN-OS 11.2\n11.2.0 through 11.2.4\nUpgrade to 11.2.5 or later\nPAN-OS 11.111.1.0 through 11.1.7\nUpgrade to 11.1.8 or later\nPAN-OS 11.0 (EoL) Upgrade to a supported fixed versionPAN-OS 10.210.2.13Upgrade to 10.2.13-h5 or 10.2.14 or later\n 10.2.0 through 10.2.13\nUpgrade to 10.2.14 or later\nPAN-OS 10.1\n10.1.0 through 10.1.14Upgrade to 10.1.14-h11 or laterAll other older\nunsupported\nPAN-OS versions Upgrade to a supported fixed version.",
            },
         ],
         source: {
            defect: [
               "PAN-271351",
            ],
            discovery: "EXTERNAL",
         },
         timeline: [
            {
               lang: "en",
               time: "2025-03-13T21:30:00.000Z",
               value: "Updated the required configuration and workarounds sections",
            },
            {
               lang: "en",
               time: "2025-03-12T21:00:00.000Z",
               value: "Updated the product status table to match the solution table",
            },
            {
               lang: "en",
               time: "2025-03-12T16:00:00.000Z",
               value: "Initial Publication",
            },
            {
               lang: "en",
               time: "2025-03-17T16:45:00.000Z",
               value: "Updated the required configuration and workarounds sections",
            },
         ],
         title: "PAN-OS: Firewall Denial of Service (DoS) Using a Specially Crafted LLDP Frame",
         workarounds: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "<b>Option 1:</b><br>If you are not using LLDP, you should disable it to mitigate this issue by performing the following steps in your web interface:<br><ol><li>Select <b>Network</b> &gt; <b>LLDP</b>.</li><li>Open LLDP General settings.<br></li><li>Disable (uncheck) LLDP.</li></ol><b>Option 2:</b><br>You can disable LLDP for your network interfaces by performing the following steps in your web interface:<br><ol><li>Select <b>Network &gt; Interfaces</b>&nbsp;and select the interface you wish to disable LLDP for.</li><li>Select <b>Advanced &gt; LLDP</b>.</li><li>Disable (uncheck) LLDP.&nbsp;</li></ol><br><b>Option 3:</b><br>If you are using LLDP only to advertise information about your PAN-OS device to other neighboring devices, you should set the LLDP mode to transmit-only for the profile used on your network interfaces by performing the following steps in your web interface:<br><ol><li>Select <b>Network &gt; Network Profiles &gt; LLDP Profile</b></li><li>Select the profile used with the interface</li><li>Set the \"Mode\" to \"transmit-only\".&nbsp;</li></ol>",
                  },
               ],
               value: "Option 1:\nIf you are not using LLDP, you should disable it to mitigate this issue by performing the following steps in your web interface:\n  *  Select Network > LLDP.\n  *  Open LLDP General settings.\n\n  *  Disable (uncheck) LLDP.\nOption 2:\nYou can disable LLDP for your network interfaces by performing the following steps in your web interface:\n  *  Select Network > Interfaces and select the interface you wish to disable LLDP for.\n  *  Select Advanced > LLDP.\n  *  Disable (uncheck) LLDP. \n\nOption 3:\nIf you are using LLDP only to advertise information about your PAN-OS device to other neighboring devices, you should set the LLDP mode to transmit-only for the profile used on your network interfaces by performing the following steps in your web interface:\n  *  Select Network > Network Profiles > LLDP Profile\n  *  Select the profile used with the interface\n  *  Set the \"Mode\" to \"transmit-only\".",
            },
         ],
         x_affectedList: [
            "PAN-OS 11.2.4-h4",
            "PAN-OS 11.2.4-h3",
            "PAN-OS 11.2.4-h2",
            "PAN-OS 11.2.4-h1",
            "PAN-OS 11.2.4",
            "PAN-OS 11.2.3-h5",
            "PAN-OS 11.2.3-h4",
            "PAN-OS 11.2.3-h3",
            "PAN-OS 11.2.3-h2",
            "PAN-OS 11.2.3-h1",
            "PAN-OS 11.2.3",
            "PAN-OS 11.2.2-h2",
            "PAN-OS 11.2.2-h1",
            "PAN-OS 11.2.1-h1",
            "PAN-OS 11.2.1",
            "PAN-OS 11.2.0-h1",
            "PAN-OS 11.2.0",
            "PAN-OS 11.1.6-h2",
            "PAN-OS 11.1.6-h1",
            "PAN-OS 11.1.6",
            "PAN-OS 11.1.5-h1",
            "PAN-OS 11.1.5",
            "PAN-OS 11.1.4-h13",
            "PAN-OS 11.1.4-h12",
            "PAN-OS 11.1.4-h11",
            "PAN-OS 11.1.4-h10",
            "PAN-OS 11.1.4-h9",
            "PAN-OS 11.1.4-h8",
            "PAN-OS 11.1.4-h7",
            "PAN-OS 11.1.4-h6",
            "PAN-OS 11.1.4-h5",
            "PAN-OS 11.1.4-h4",
            "PAN-OS 11.1.4-h3",
            "PAN-OS 11.1.4-h2",
            "PAN-OS 11.1.4-h1",
            "PAN-OS 11.1.4",
            "PAN-OS 11.1.3-h13",
            "PAN-OS 11.1.3-h12",
            "PAN-OS 11.1.3-h11",
            "PAN-OS 11.1.3-h10",
            "PAN-OS 11.1.3-h9",
            "PAN-OS 11.1.3-h8",
            "PAN-OS 11.1.3-h7",
            "PAN-OS 11.1.3-h6",
            "PAN-OS 11.1.3-h5",
            "PAN-OS 11.1.3-h4",
            "PAN-OS 11.1.3-h3",
            "PAN-OS 11.1.3-h2",
            "PAN-OS 11.1.3-h1",
            "PAN-OS 11.1.3",
            "PAN-OS 11.1.2-h18",
            "PAN-OS 11.1.2-h17",
            "PAN-OS 11.1.2-h16",
            "PAN-OS 11.1.2-h15",
            "PAN-OS 11.1.2-h14",
            "PAN-OS 11.1.2-h13",
            "PAN-OS 11.1.2-h12",
            "PAN-OS 11.1.2-h11",
            "PAN-OS 11.1.2-h10",
            "PAN-OS 11.1.2-h9",
            "PAN-OS 11.1.2-h8",
            "PAN-OS 11.1.2-h7",
            "PAN-OS 11.1.2-h6",
            "PAN-OS 11.1.2-h5",
            "PAN-OS 11.1.2-h4",
            "PAN-OS 11.1.2-h3",
            "PAN-OS 11.1.2-h2",
            "PAN-OS 11.1.2-h1",
            "PAN-OS 11.1.2",
            "PAN-OS 11.1.1-h2",
            "PAN-OS 11.1.1-h1",
            "PAN-OS 11.1.1",
            "PAN-OS 11.1.0-h4",
            "PAN-OS 11.1.0-h3",
            "PAN-OS 11.1.0-h2",
            "PAN-OS 11.1.0-h1",
            "PAN-OS 11.1.0",
            "PAN-OS 10.2.13-h4",
            "PAN-OS 10.2.13-h3",
            "PAN-OS 10.2.13-h2",
            "PAN-OS 10.2.13-h1",
            "PAN-OS 10.2.13",
            "PAN-OS 10.2.12-h6",
            "PAN-OS 10.2.12-h5",
            "PAN-OS 10.2.12-h4",
            "PAN-OS 10.2.12-h3",
            "PAN-OS 10.2.12-h2",
            "PAN-OS 10.2.12-h1",
            "PAN-OS 10.2.12",
            "PAN-OS 10.2.11-h12",
            "PAN-OS 10.2.11-h11",
            "PAN-OS 10.2.11-h10",
            "PAN-OS 10.2.11-h9",
            "PAN-OS 10.2.11-h8",
            "PAN-OS 10.2.11-h7",
            "PAN-OS 10.2.11-h6",
            "PAN-OS 10.2.11-h5",
            "PAN-OS 10.2.11-h4",
            "PAN-OS 10.2.11-h3",
            "PAN-OS 10.2.11-h2",
            "PAN-OS 10.2.11-h1",
            "PAN-OS 10.2.11",
            "PAN-OS 10.2.10-h14",
            "PAN-OS 10.2.10-h13",
            "PAN-OS 10.2.10-h12",
            "PAN-OS 10.2.10-h11",
            "PAN-OS 10.2.10-h10",
            "PAN-OS 10.2.10-h9",
            "PAN-OS 10.2.10-h8",
            "PAN-OS 10.2.10-h7",
            "PAN-OS 10.2.10-h6",
            "PAN-OS 10.2.10-h5",
            "PAN-OS 10.2.10-h4",
            "PAN-OS 10.2.10-h3",
            "PAN-OS 10.2.10-h2",
            "PAN-OS 10.2.10-h1",
            "PAN-OS 10.2.10",
            "PAN-OS 10.2.9-h21",
            "PAN-OS 10.2.9-h20",
            "PAN-OS 10.2.9-h19",
            "PAN-OS 10.2.9-h18",
            "PAN-OS 10.2.9-h17",
            "PAN-OS 10.2.9-h16",
            "PAN-OS 10.2.9-h15",
            "PAN-OS 10.2.9-h14",
            "PAN-OS 10.2.9-h13",
            "PAN-OS 10.2.9-h12",
            "PAN-OS 10.2.9-h11",
            "PAN-OS 10.2.9-h10",
            "PAN-OS 10.2.9-h9",
            "PAN-OS 10.2.9-h8",
            "PAN-OS 10.2.9-h7",
            "PAN-OS 10.2.9-h6",
            "PAN-OS 10.2.9-h5",
            "PAN-OS 10.2.9-h4",
            "PAN-OS 10.2.9-h3",
            "PAN-OS 10.2.9-h2",
            "PAN-OS 10.2.9-h1",
            "PAN-OS 10.2.9",
            "PAN-OS 10.2.8-h21",
            "PAN-OS 10.2.8-h20",
            "PAN-OS 10.2.8-h19",
            "PAN-OS 10.2.8-h18",
            "PAN-OS 10.2.8-h17",
            "PAN-OS 10.2.8-h16",
            "PAN-OS 10.2.8-h15",
            "PAN-OS 10.2.8-h14",
            "PAN-OS 10.2.8-h13",
            "PAN-OS 10.2.8-h12",
            "PAN-OS 10.2.8-h11",
            "PAN-OS 10.2.8-h10",
            "PAN-OS 10.2.8-h9",
            "PAN-OS 10.2.8-h8",
            "PAN-OS 10.2.8-h7",
            "PAN-OS 10.2.8-h6",
            "PAN-OS 10.2.8-h5",
            "PAN-OS 10.2.8-h4",
            "PAN-OS 10.2.8-h3",
            "PAN-OS 10.2.8-h2",
            "PAN-OS 10.2.8-h1",
            "PAN-OS 10.2.8",
            "PAN-OS 10.2.7-h24",
            "PAN-OS 10.2.7-h23",
            "PAN-OS 10.2.7-h22",
            "PAN-OS 10.2.7-h21",
            "PAN-OS 10.2.7-h20",
            "PAN-OS 10.2.7-h19",
            "PAN-OS 10.2.7-h18",
            "PAN-OS 10.2.7-h17",
            "PAN-OS 10.2.7-h16",
            "PAN-OS 10.2.7-h15",
            "PAN-OS 10.2.7-h14",
            "PAN-OS 10.2.7-h13",
            "PAN-OS 10.2.7-h12",
            "PAN-OS 10.2.7-h11",
            "PAN-OS 10.2.7-h10",
            "PAN-OS 10.2.7-h9",
            "PAN-OS 10.2.7-h8",
            "PAN-OS 10.2.7-h7",
            "PAN-OS 10.2.7-h6",
            "PAN-OS 10.2.7-h5",
            "PAN-OS 10.2.7-h4",
            "PAN-OS 10.2.7-h3",
            "PAN-OS 10.2.7-h2",
            "PAN-OS 10.2.7-h1",
            "PAN-OS 10.2.7",
            "PAN-OS 10.2.6-h6",
            "PAN-OS 10.2.6-h5",
            "PAN-OS 10.2.6-h4",
            "PAN-OS 10.2.6-h3",
            "PAN-OS 10.2.6-h2",
            "PAN-OS 10.2.6-h1",
            "PAN-OS 10.2.6",
            "PAN-OS 10.2.5-h9",
            "PAN-OS 10.2.5-h8",
            "PAN-OS 10.2.5-h7",
            "PAN-OS 10.2.5-h6",
            "PAN-OS 10.2.5-h5",
            "PAN-OS 10.2.5-h4",
            "PAN-OS 10.2.5-h3",
            "PAN-OS 10.2.5-h2",
            "PAN-OS 10.2.5-h1",
            "PAN-OS 10.2.5",
            "PAN-OS 10.2.4-h32",
            "PAN-OS 10.2.4-h31",
            "PAN-OS 10.2.4-h30",
            "PAN-OS 10.2.4-h29",
            "PAN-OS 10.2.4-h28",
            "PAN-OS 10.2.4-h27",
            "PAN-OS 10.2.4-h26",
            "PAN-OS 10.2.4-h25",
            "PAN-OS 10.2.4-h24",
            "PAN-OS 10.2.4-h23",
            "PAN-OS 10.2.4-h22",
            "PAN-OS 10.2.4-h21",
            "PAN-OS 10.2.4-h20",
            "PAN-OS 10.2.4-h19",
            "PAN-OS 10.2.4-h18",
            "PAN-OS 10.2.4-h17",
            "PAN-OS 10.2.4-h16",
            "PAN-OS 10.2.4-h15",
            "PAN-OS 10.2.4-h14",
            "PAN-OS 10.2.4-h13",
            "PAN-OS 10.2.4-h12",
            "PAN-OS 10.2.4-h11",
            "PAN-OS 10.2.4-h10",
            "PAN-OS 10.2.4-h9",
            "PAN-OS 10.2.4-h8",
            "PAN-OS 10.2.4-h7",
            "PAN-OS 10.2.4-h6",
            "PAN-OS 10.2.4-h5",
            "PAN-OS 10.2.4-h4",
            "PAN-OS 10.2.4-h3",
            "PAN-OS 10.2.4-h2",
            "PAN-OS 10.2.4-h1",
            "PAN-OS 10.2.4",
            "PAN-OS 10.2.3-h14",
            "PAN-OS 10.2.3-h13",
            "PAN-OS 10.2.3-h12",
            "PAN-OS 10.2.3-h11",
            "PAN-OS 10.2.3-h10",
            "PAN-OS 10.2.3-h9",
            "PAN-OS 10.2.3-h8",
            "PAN-OS 10.2.3-h7",
            "PAN-OS 10.2.3-h6",
            "PAN-OS 10.2.3-h5",
            "PAN-OS 10.2.3-h4",
            "PAN-OS 10.2.3-h3",
            "PAN-OS 10.2.3-h2",
            "PAN-OS 10.2.3-h1",
            "PAN-OS 10.2.3",
            "PAN-OS 10.2.2-h6",
            "PAN-OS 10.2.2-h5",
            "PAN-OS 10.2.2-h4",
            "PAN-OS 10.2.2-h3",
            "PAN-OS 10.2.2-h2",
            "PAN-OS 10.2.2-h1",
            "PAN-OS 10.2.2",
            "PAN-OS 10.2.1-h3",
            "PAN-OS 10.2.1-h2",
            "PAN-OS 10.2.1-h1",
            "PAN-OS 10.2.1",
            "PAN-OS 10.2.0-h4",
            "PAN-OS 10.2.0-h3",
            "PAN-OS 10.2.0-h2",
            "PAN-OS 10.2.0-h1",
            "PAN-OS 10.2.0",
            "PAN-OS 10.1.14-h10",
            "PAN-OS 10.1.14-h9",
            "PAN-OS 10.1.14-h8",
            "PAN-OS 10.1.14-h7",
            "PAN-OS 10.1.14-h6",
            "PAN-OS 10.1.14-h5",
            "PAN-OS 10.1.14-h4",
            "PAN-OS 10.1.14-h3",
            "PAN-OS 10.1.14-h2",
            "PAN-OS 10.1.14-h1",
            "PAN-OS 10.1.14",
            "PAN-OS 10.1.13-h5",
            "PAN-OS 10.1.13-h4",
            "PAN-OS 10.1.13-h3",
            "PAN-OS 10.1.13-h2",
            "PAN-OS 10.1.13-h1",
            "PAN-OS 10.1.13",
            "PAN-OS 10.1.12-h3",
            "PAN-OS 10.1.12-h2",
            "PAN-OS 10.1.12-h1",
            "PAN-OS 10.1.12",
            "PAN-OS 10.1.11-h10",
            "PAN-OS 10.1.11-h9",
            "PAN-OS 10.1.11-h8",
            "PAN-OS 10.1.11-h7",
            "PAN-OS 10.1.11-h6",
            "PAN-OS 10.1.11-h5",
            "PAN-OS 10.1.11-h4",
            "PAN-OS 10.1.11-h3",
            "PAN-OS 10.1.11-h2",
            "PAN-OS 10.1.11-h1",
            "PAN-OS 10.1.11",
            "PAN-OS 10.1.10-h9",
            "PAN-OS 10.1.10-h8",
            "PAN-OS 10.1.10-h7",
            "PAN-OS 10.1.10-h6",
            "PAN-OS 10.1.10-h5",
            "PAN-OS 10.1.10-h4",
            "PAN-OS 10.1.10-h3",
            "PAN-OS 10.1.10-h2",
            "PAN-OS 10.1.10-h1",
            "PAN-OS 10.1.10",
            "PAN-OS 10.1.9-h14",
            "PAN-OS 10.1.9-h13",
            "PAN-OS 10.1.9-h12",
            "PAN-OS 10.1.9-h11",
            "PAN-OS 10.1.9-h10",
            "PAN-OS 10.1.9-h9",
            "PAN-OS 10.1.9-h8",
            "PAN-OS 10.1.9-h7",
            "PAN-OS 10.1.9-h6",
            "PAN-OS 10.1.9-h5",
            "PAN-OS 10.1.9-h4",
            "PAN-OS 10.1.9-h3",
            "PAN-OS 10.1.9-h2",
            "PAN-OS 10.1.9-h1",
            "PAN-OS 10.1.9",
            "PAN-OS 10.1.8-h8",
            "PAN-OS 10.1.8-h7",
            "PAN-OS 10.1.8-h6",
            "PAN-OS 10.1.8-h5",
            "PAN-OS 10.1.8-h4",
            "PAN-OS 10.1.8-h3",
            "PAN-OS 10.1.8-h2",
            "PAN-OS 10.1.8-h1",
            "PAN-OS 10.1.8",
            "PAN-OS 10.1.7-h1",
            "PAN-OS 10.1.7",
            "PAN-OS 10.1.6-h9",
            "PAN-OS 10.1.6-h8",
            "PAN-OS 10.1.6-h7",
            "PAN-OS 10.1.6-h6",
            "PAN-OS 10.1.6-h5",
            "PAN-OS 10.1.6-h4",
            "PAN-OS 10.1.6-h3",
            "PAN-OS 10.1.6-h2",
            "PAN-OS 10.1.6-h1",
            "PAN-OS 10.1.6",
            "PAN-OS 10.1.5-h4",
            "PAN-OS 10.1.5-h3",
            "PAN-OS 10.1.5-h2",
            "PAN-OS 10.1.5-h1",
            "PAN-OS 10.1.5",
            "PAN-OS 10.1.4-h6",
            "PAN-OS 10.1.4-h5",
            "PAN-OS 10.1.4-h4",
            "PAN-OS 10.1.4-h3",
            "PAN-OS 10.1.4-h2",
            "PAN-OS 10.1.4-h1",
            "PAN-OS 10.1.4",
            "PAN-OS 10.1.3-h4",
            "PAN-OS 10.1.3-h3",
            "PAN-OS 10.1.3-h2",
            "PAN-OS 10.1.3-h1",
            "PAN-OS 10.1.3",
            "PAN-OS 10.1.2",
            "PAN-OS 10.1.1",
            "PAN-OS 10.1.0",
         ],
         x_generator: {
            engine: "Vulnogram 0.1.0-dev",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "d6c1279f-00f6-4ef7-9217-f89ffe703ec0",
      assignerShortName: "palo_alto",
      cveId: "CVE-2025-0116",
      datePublished: "2025-03-12T18:34:38.222Z",
      dateReserved: "2024-12-20T23:23:17.743Z",
      dateUpdated: "2025-03-17T23:58:12.045Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
   "vulnerability-lookup:meta": {
      nvd: "{\"cve\":{\"id\":\"CVE-2025-0116\",\"sourceIdentifier\":\"psirt@paloaltonetworks.com\",\"published\":\"2025-03-12T19:15:37.727\",\"lastModified\":\"2025-03-18T00:15:12.860\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A Denial of Service (DoS) vulnerability in Palo Alto Networks PAN-OS software causes the firewall to unexpectedly reboot when processing a specially crafted LLDP frame sent by an unauthenticated adjacent attacker. Repeated attempts to initiate this condition causes the firewall to enter maintenance mode.\\n\\nThis issue does not apply to Cloud NGFWs or Prisma Access software.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad de denegación de servicio (DoS) en el software PAN-OS de Palo Alto Networks provoca que el firewall se reinicie inesperadamente al procesar una trama LLDP especialmente manipulada enviada por un atacante adyacente no autenticado. Los intentos repetidos de iniciar esta condición hacen que el firewall entre en modo de mantenimiento. Este problema no afecta a los NGFW en la nube ni al software Prisma Access.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"psirt@paloaltonetworks.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:U/V:C/RE:M/U:Amber\",\"baseScore\":6.8,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"ADJACENT\",\"attackComplexity\":\"LOW\",\"attackRequirements\":\"NONE\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"ACTIVE\",\"vulnConfidentialityImpact\":\"NONE\",\"vulnIntegrityImpact\":\"NONE\",\"vulnAvailabilityImpact\":\"HIGH\",\"subConfidentialityImpact\":\"NONE\",\"subIntegrityImpact\":\"NONE\",\"subAvailabilityImpact\":\"NONE\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NO\",\"Recovery\":\"USER\",\"valueDensity\":\"CONCENTRATED\",\"vulnerabilityResponseEffort\":\"MODERATE\",\"providerUrgency\":\"AMBER\"}}]},\"weaknesses\":[{\"source\":\"psirt@paloaltonetworks.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-754\"}]}],\"references\":[{\"url\":\"https://security.paloaltonetworks.com/CVE-2025-0116\",\"source\":\"psirt@paloaltonetworks.com\"}]}}",
      vulnrichment: {
         containers: "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-0116\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-03-12T19:21:54.917072Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-03-12T19:22:00.874Z\"}}], \"cna\": {\"title\": \"PAN-OS: Firewall Denial of Service (DoS) Using a Specially Crafted LLDP Frame\", \"source\": {\"defect\": [\"PAN-271351\"], \"discovery\": \"EXTERNAL\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"an external reporter\"}], \"impacts\": [{\"capecId\": \"CAPEC-153\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-153 Input Data Manipulation\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV4_0\": {\"Safety\": \"NOT_DEFINED\", \"version\": \"4.0\", \"Recovery\": \"USER\", \"baseScore\": 6.8, \"Automatable\": \"NO\", \"attackVector\": \"ADJACENT\", \"baseSeverity\": \"MEDIUM\", \"valueDensity\": \"CONCENTRATED\", \"vectorString\": \"CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/AU:N/R:U/V:C/RE:M/U:Amber\", \"providerUrgency\": \"AMBER\", \"userInteraction\": \"ACTIVE\", \"attackComplexity\": \"LOW\", \"attackRequirements\": \"NONE\", \"privilegesRequired\": \"NONE\", \"subIntegrityImpact\": \"NONE\", \"vulnIntegrityImpact\": \"NONE\", \"subAvailabilityImpact\": \"NONE\", \"vulnAvailabilityImpact\": \"HIGH\", \"subConfidentialityImpact\": \"NONE\", \"vulnConfidentialityImpact\": \"NONE\", \"vulnerabilityResponseEffort\": \"MODERATE\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"cpes\": [\"cpe:2.3:o:paloaltonetworks:pan-os:11.2.4:*:*:*:*:*:*:*\", \"cpe:2.3:o:paloaltonetworks:pan-os:11.2.3:*:*:*:*:*:*:*\", \"cpe:2.3:o:paloaltonetworks:pan-os:11.2.2:*:*:*:*:*:*:*\", \"cpe:2.3:o:paloaltonetworks:pan-os:11.2.1:*:*:*:*:*:*:*\", \"cpe:2.3:o:paloaltonetworks:pan-os:11.2.0:*:*:*:*:*:*:*\", \"cpe:2.3:o:paloaltonetworks:pan-os:11.1.6:*:*:*:*:*:*:*\", \"cpe:2.3:o:paloaltonetworks:pan-os:11.1.5:*:*:*:*:*:*:*\", \"cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:*:*:*:*:*:*:*\", \"cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:*:*:*:*:*:*:*\", \"cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:*:*:*:*:*:*:*\", \"cpe:2.3:o:paloaltonetworks:pan-os:11.1.1:*:*:*:*:*:*:*\", \"cpe:2.3:o:paloaltonetworks:pan-os:11.1.0:*:*:*:*:*:*:*\", \"cpe:2.3:o:paloaltonetworks:pan-os:10.2.13:h4:*:*:*:*:*:*\", \"cpe:2.3:o:paloaltonetworks:pan-os:10.2.13:h3:*:*:*:*:*:*\", \"cpe:2.3:o:paloaltonetworks:pan-os:10.2.13:h2:*:*:*:*:*:*\", \"cpe:2.3:o:paloaltonetworks:pan-os:10.2.13:h1:*:*:*:*:*:*\", \"cpe:2.3:o:paloaltonetworks:pan-os:10.2.13:-:*:*:*:*:*:*\", \"cpe:2.3:o:paloaltonetworks:pan-os:10.2.12:*:*:*:*:*:*:*\", \"cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:*:*:*:*:*:*:*\", \"cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:*:*:*:*:*:*:*\", \"cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:*:*:*:*:*:*:*\", \"cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:*:*:*:*:*:*:*\", \"cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:*:*:*:*:*:*:*\", \"cpe:2.3:o:paloaltonetworks:pan-os:10.2.6:*:*:*:*:*:*:*\", \"cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:*:*:*:*:*:*:*\", \"cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:*:*:*:*:*:*:*\", \"cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:*:*:*:*:*:*:*\", \"cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:*:*:*:*:*:*:*\", \"cpe:2.3:o:paloaltonetworks:pan-os:10.2.1:*:*:*:*:*:*:*\", \"cpe:2.3:o:paloaltonetworks:pan-os:10.2.0:*:*:*:*:*:*:*\", \"cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h10:*:*:*:*:*:*\", \"cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h9:*:*:*:*:*:*\", \"cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h8:*:*:*:*:*:*\", \"cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h7:*:*:*:*:*:*\", \"cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h6:*:*:*:*:*:*\", \"cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h5:*:*:*:*:*:*\", \"cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h4:*:*:*:*:*:*\", \"cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h3:*:*:*:*:*:*\", \"cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h2:*:*:*:*:*:*\", \"cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h1:*:*:*:*:*:*\", \"cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:-:*:*:*:*:*:*\", \"cpe:2.3:o:paloaltonetworks:pan-os:10.1.13:*:*:*:*:*:*:*\", \"cpe:2.3:o:paloaltonetworks:pan-os:10.1.12:*:*:*:*:*:*:*\", \"cpe:2.3:o:paloaltonetworks:pan-os:10.1.11:*:*:*:*:*:*:*\", \"cpe:2.3:o:paloaltonetworks:pan-os:10.1.10:*:*:*:*:*:*:*\", \"cpe:2.3:o:paloaltonetworks:pan-os:10.1.9:*:*:*:*:*:*:*\", \"cpe:2.3:o:paloaltonetworks:pan-os:10.1.8:*:*:*:*:*:*:*\", \"cpe:2.3:o:paloaltonetworks:pan-os:10.1.7:*:*:*:*:*:*:*\", \"cpe:2.3:o:paloaltonetworks:pan-os:10.1.6:*:*:*:*:*:*:*\", \"cpe:2.3:o:paloaltonetworks:pan-os:10.1.5:*:*:*:*:*:*:*\", \"cpe:2.3:o:paloaltonetworks:pan-os:10.1.4:*:*:*:*:*:*:*\", \"cpe:2.3:o:paloaltonetworks:pan-os:10.1.3:*:*:*:*:*:*:*\", \"cpe:2.3:o:paloaltonetworks:pan-os:10.1.2:*:*:*:*:*:*:*\", \"cpe:2.3:o:paloaltonetworks:pan-os:10.1.1:*:*:*:*:*:*:*\", \"cpe:2.3:o:paloaltonetworks:pan-os:10.1.0:*:*:*:*:*:*:*\"], \"vendor\": \"Palo Alto Networks\", \"product\": \"PAN-OS\", \"versions\": [{\"status\": \"affected\", \"changes\": [{\"at\": \"11.2.5\", \"status\": \"unaffected\"}], \"version\": \"11.2.0\", \"lessThan\": \"11.2.5\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"changes\": [{\"at\": \"11.1.8\", \"status\": \"unaffected\"}], \"version\": \"11.1.0\", \"lessThan\": \"11.1.8\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"changes\": [{\"at\": \"10.2.14\", \"status\": \"unaffected\"}, {\"at\": \"10.2.13-h5\", \"status\": \"unaffected\"}], \"version\": \"10.2.0\", \"lessThan\": \"10.2.14\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"changes\": [{\"at\": \"10.1.14-h11\", \"status\": \"unaffected\"}], \"version\": \"10.1.0\", \"lessThan\": \"10.1.14-h11\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Palo Alto Networks\", \"product\": \"Cloud NGFW\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"All\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Palo Alto Networks\", \"product\": \"Prisma Access\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"All\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}], \"exploits\": [{\"lang\": \"en\", \"value\": \"Palo Alto Networks is not aware of any malicious exploitation of this issue.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"Palo Alto Networks is not aware of any malicious exploitation of this issue.\", \"base64\": false}]}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2025-03-13T21:30:00.000Z\", \"value\": \"Updated the required configuration and workarounds sections\"}, {\"lang\": \"en\", \"time\": \"2025-03-12T21:00:00.000Z\", \"value\": \"Updated the product status table to match the solution table\"}, {\"lang\": \"en\", \"time\": \"2025-03-12T16:00:00.000Z\", \"value\": \"Initial Publication\"}, {\"lang\": \"en\", \"time\": \"2025-03-17T16:45:00.000Z\", \"value\": \"Updated the required configuration and workarounds sections\"}], \"solutions\": [{\"lang\": \"eng\", \"value\": \"Version\\nMinor Version\\nSuggested Solution\\nPAN-OS 11.2\\n11.2.0 through 11.2.4\\nUpgrade to 11.2.5 or later\\nPAN-OS 11.111.1.0 through 11.1.7\\nUpgrade to 11.1.8 or later\\nPAN-OS 11.0 (EoL)\\u00a0Upgrade to a supported fixed versionPAN-OS 10.210.2.13Upgrade to 10.2.13-h5 or 10.2.14 or later\\n\\u00a010.2.0 through 10.2.13\\nUpgrade to 10.2.14 or later\\nPAN-OS 10.1\\n10.1.0 through 10.1.14Upgrade to 10.1.14-h11 or laterAll other older\\nunsupported\\nPAN-OS versions\\u00a0Upgrade to a supported fixed version.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"<table><thead><tr><th>Version<br></th><th>Minor Version<br></th><th>Suggested Solution<br></th></tr></thead><tbody><tr><td>PAN-OS 11.2<br></td><td>11.2.0 through 11.2.4<br></td><td>Upgrade to 11.2.5 or later<br></td></tr><tr><td>PAN-OS 11.1</td><td>11.1.0 through 11.1.7<br></td><td>Upgrade to 11.1.8 or later<br></td></tr><tr><td>PAN-OS 11.0 (EoL)</td><td>&nbsp;</td><td>Upgrade to a supported fixed version</td></tr><tr><td>PAN-OS 10.2</td><td>10.2.13</td><td>Upgrade to 10.2.13-h5 or 10.2.14 or later<br></td></tr><tr><td>&nbsp;</td><td>10.2.0 through 10.2.13<br></td><td>Upgrade to 10.2.14 or later<br></td></tr><tr><td>PAN-OS 10.1<br></td><td>10.1.0 through 10.1.14</td><td>Upgrade to 10.1.14-h11 or later</td></tr><tr><td>All other older<br>unsupported<br>PAN-OS versions</td><td>&nbsp;</td><td>Upgrade to a supported fixed version.</td></tr></tbody></table><br><p></p>\", \"base64\": false}]}], \"datePublic\": \"2025-03-12T16:00:00.000Z\", \"references\": [{\"url\": \"https://security.paloaltonetworks.com/CVE-2025-0116\", \"tags\": [\"vendor-advisory\"]}], \"workarounds\": [{\"lang\": \"en\", \"value\": \"Option 1:\\nIf you are not using LLDP, you should disable it to mitigate this issue by performing the following steps in your web interface:\\n  *  Select Network > LLDP.\\n  *  Open LLDP General settings.\\n\\n  *  Disable (uncheck) LLDP.\\nOption 2:\\nYou can disable LLDP for your network interfaces by performing the following steps in your web interface:\\n  *  Select Network > Interfaces\\u00a0and select the interface you wish to disable LLDP for.\\n  *  Select Advanced > LLDP.\\n  *  Disable (uncheck) LLDP.\\u00a0\\n\\nOption 3:\\nIf you are using LLDP only to advertise information about your PAN-OS device to other neighboring devices, you should set the LLDP mode to transmit-only for the profile used on your network interfaces by performing the following steps in your web interface:\\n  *  Select Network > Network Profiles > LLDP Profile\\n  *  Select the profile used with the interface\\n  *  Set the \\\"Mode\\\" to \\\"transmit-only\\\".\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"<b>Option 1:</b><br>If you are not using LLDP, you should disable it to mitigate this issue by performing the following steps in your web interface:<br><ol><li>Select <b>Network</b> &gt; <b>LLDP</b>.</li><li>Open LLDP General settings.<br></li><li>Disable (uncheck) LLDP.</li></ol><b>Option 2:</b><br>You can disable LLDP for your network interfaces by performing the following steps in your web interface:<br><ol><li>Select <b>Network &gt; Interfaces</b>&nbsp;and select the interface you wish to disable LLDP for.</li><li>Select <b>Advanced &gt; LLDP</b>.</li><li>Disable (uncheck) LLDP.&nbsp;</li></ol><br><b>Option 3:</b><br>If you are using LLDP only to advertise information about your PAN-OS device to other neighboring devices, you should set the LLDP mode to transmit-only for the profile used on your network interfaces by performing the following steps in your web interface:<br><ol><li>Select <b>Network &gt; Network Profiles &gt; LLDP Profile</b></li><li>Select the profile used with the interface</li><li>Set the \\\"Mode\\\" to \\\"transmit-only\\\".&nbsp;</li></ol>\", \"base64\": false}]}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"A Denial of Service (DoS) vulnerability in Palo Alto Networks PAN-OS software causes the firewall to unexpectedly reboot when processing a specially crafted LLDP frame sent by an unauthenticated adjacent attacker. Repeated attempts to initiate this condition causes the firewall to enter maintenance mode.\\n\\nThis issue does not apply to Cloud NGFWs or Prisma Access software.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"A Denial of Service (DoS) vulnerability in Palo Alto Networks PAN-OS software causes the firewall to unexpectedly reboot when processing a specially crafted LLDP frame sent by an unauthenticated adjacent attacker. Repeated attempts to initiate this condition causes the firewall to enter maintenance mode.<br><br>This issue does not apply to Cloud NGFWs or Prisma Access software.\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-754\", \"description\": \"CWE-754 Improper Check for Unusual or Exceptional Conditions\"}]}], \"configurations\": [{\"lang\": \"en\", \"value\": \"To be vulnerable, all of the following conditions must be true:\\n  *  You must have enabled LLDP in your PAN-OS software to be vulnerable to this issue. You can verify whether you have LLDP enabled by following these steps in your web interface:  *  Select Network > LLDP.\\n\\n  *  In the LLDP General settings, verify whether LLDP is enabled (checked).\\n\\n  *  LLDP must be enabled on at least one network interface. You\\u00a0can verify whether you have LLDP enabled on an interface by following these steps in your web interface:\\n  *  Select Network > LLDP.\\n\\n  *  Verify if any interfaces are listed\\n  *  Verify if for any listed interface LLDP is enabled (checked)\\u00a0\\n  *  The LLDP profile associated with the an interface must have the \\\"Mode\\\" configured to \\\"transmit-receive\\\" or \\\"receive-only\\\". You can verify the \\\"Mode\\\" in your LLDP profile\\u00a0by following these steps in your web interface:\\n  *  Select Network > LLDP.\\n\\n  *   For any interfaces where LLDP is enabled, find the profile associated with it.\\n\\n  *  Select\\u00a0Network > Network Profiles > LLDP Profile\\n  *  Select the profile used with the interface\\n  *  Verify if the \\\"Mode\\\" is set to\\u00a0\\\"transmit-receive\\\" or \\\"receive-only\\\"\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"To be vulnerable, all of the following conditions must be true:<br><ol><li>You must have enabled LLDP in your PAN-OS software to be vulnerable to this issue. You can verify whether you have LLDP enabled by following these steps in your web interface:<ol><li>Select <b>Network</b> &gt; <b>LLDP</b>.<br></li><li>In the LLDP General settings, verify whether LLDP is enabled (checked).</li></ol></li><li>LLDP must be enabled on at least one network interface. You&nbsp;can verify whether you have LLDP enabled on an interface by following these steps in your web interface:</li><ol><li>Select <b>Network &gt; LLDP.<br></b></li><li>Verify if any interfaces are listed</li><li>Verify if for any listed interface LLDP is enabled (checked)&nbsp;</li></ol><li>The LLDP profile associated with the an interface must have the \\\"Mode\\\" configured to \\\"transmit-receive\\\" or \\\"receive-only\\\". You can verify the \\\"Mode\\\" in your LLDP profile&nbsp;by following these steps in your web interface:</li><ol><li>Select <b>Network &gt; LLDP.</b><br></li><li> For any interfaces where LLDP is enabled, find the profile associated with it.<br></li><li>Select&nbsp;<b>Network &gt; Network Profiles &gt; LLDP Profile</b></li><li>Select the profile used with the interface</li><li>Verify if the \\\"Mode\\\" is set to&nbsp;\\\"transmit-receive\\\" or \\\"receive-only\\\"&nbsp;</li></ol></ol>\", \"base64\": false}]}], \"x_affectedList\": [\"PAN-OS 11.2.4-h4\", \"PAN-OS 11.2.4-h3\", \"PAN-OS 11.2.4-h2\", \"PAN-OS 11.2.4-h1\", \"PAN-OS 11.2.4\", \"PAN-OS 11.2.3-h5\", \"PAN-OS 11.2.3-h4\", \"PAN-OS 11.2.3-h3\", \"PAN-OS 11.2.3-h2\", \"PAN-OS 11.2.3-h1\", \"PAN-OS 11.2.3\", \"PAN-OS 11.2.2-h2\", \"PAN-OS 11.2.2-h1\", \"PAN-OS 11.2.1-h1\", \"PAN-OS 11.2.1\", \"PAN-OS 11.2.0-h1\", \"PAN-OS 11.2.0\", \"PAN-OS 11.1.6-h2\", \"PAN-OS 11.1.6-h1\", \"PAN-OS 11.1.6\", \"PAN-OS 11.1.5-h1\", \"PAN-OS 11.1.5\", \"PAN-OS 11.1.4-h13\", \"PAN-OS 11.1.4-h12\", \"PAN-OS 11.1.4-h11\", \"PAN-OS 11.1.4-h10\", \"PAN-OS 11.1.4-h9\", \"PAN-OS 11.1.4-h8\", \"PAN-OS 11.1.4-h7\", \"PAN-OS 11.1.4-h6\", \"PAN-OS 11.1.4-h5\", \"PAN-OS 11.1.4-h4\", \"PAN-OS 11.1.4-h3\", \"PAN-OS 11.1.4-h2\", \"PAN-OS 11.1.4-h1\", \"PAN-OS 11.1.4\", \"PAN-OS 11.1.3-h13\", \"PAN-OS 11.1.3-h12\", \"PAN-OS 11.1.3-h11\", \"PAN-OS 11.1.3-h10\", \"PAN-OS 11.1.3-h9\", \"PAN-OS 11.1.3-h8\", \"PAN-OS 11.1.3-h7\", \"PAN-OS 11.1.3-h6\", \"PAN-OS 11.1.3-h5\", \"PAN-OS 11.1.3-h4\", \"PAN-OS 11.1.3-h3\", \"PAN-OS 11.1.3-h2\", \"PAN-OS 11.1.3-h1\", \"PAN-OS 11.1.3\", \"PAN-OS 11.1.2-h18\", \"PAN-OS 11.1.2-h17\", \"PAN-OS 11.1.2-h16\", \"PAN-OS 11.1.2-h15\", \"PAN-OS 11.1.2-h14\", \"PAN-OS 11.1.2-h13\", \"PAN-OS 11.1.2-h12\", \"PAN-OS 11.1.2-h11\", \"PAN-OS 11.1.2-h10\", \"PAN-OS 11.1.2-h9\", \"PAN-OS 11.1.2-h8\", \"PAN-OS 11.1.2-h7\", \"PAN-OS 11.1.2-h6\", \"PAN-OS 11.1.2-h5\", \"PAN-OS 11.1.2-h4\", \"PAN-OS 11.1.2-h3\", \"PAN-OS 11.1.2-h2\", \"PAN-OS 11.1.2-h1\", \"PAN-OS 11.1.2\", \"PAN-OS 11.1.1-h2\", \"PAN-OS 11.1.1-h1\", \"PAN-OS 11.1.1\", \"PAN-OS 11.1.0-h4\", \"PAN-OS 11.1.0-h3\", \"PAN-OS 11.1.0-h2\", \"PAN-OS 11.1.0-h1\", \"PAN-OS 11.1.0\", \"PAN-OS 10.2.13-h4\", \"PAN-OS 10.2.13-h3\", \"PAN-OS 10.2.13-h2\", \"PAN-OS 10.2.13-h1\", \"PAN-OS 10.2.13\", \"PAN-OS 10.2.12-h6\", \"PAN-OS 10.2.12-h5\", \"PAN-OS 10.2.12-h4\", \"PAN-OS 10.2.12-h3\", \"PAN-OS 10.2.12-h2\", \"PAN-OS 10.2.12-h1\", \"PAN-OS 10.2.12\", \"PAN-OS 10.2.11-h12\", \"PAN-OS 10.2.11-h11\", \"PAN-OS 10.2.11-h10\", \"PAN-OS 10.2.11-h9\", \"PAN-OS 10.2.11-h8\", \"PAN-OS 10.2.11-h7\", \"PAN-OS 10.2.11-h6\", \"PAN-OS 10.2.11-h5\", \"PAN-OS 10.2.11-h4\", \"PAN-OS 10.2.11-h3\", \"PAN-OS 10.2.11-h2\", \"PAN-OS 10.2.11-h1\", \"PAN-OS 10.2.11\", \"PAN-OS 10.2.10-h14\", \"PAN-OS 10.2.10-h13\", \"PAN-OS 10.2.10-h12\", \"PAN-OS 10.2.10-h11\", \"PAN-OS 10.2.10-h10\", \"PAN-OS 10.2.10-h9\", \"PAN-OS 10.2.10-h8\", \"PAN-OS 10.2.10-h7\", \"PAN-OS 10.2.10-h6\", \"PAN-OS 10.2.10-h5\", \"PAN-OS 10.2.10-h4\", \"PAN-OS 10.2.10-h3\", \"PAN-OS 10.2.10-h2\", \"PAN-OS 10.2.10-h1\", \"PAN-OS 10.2.10\", \"PAN-OS 10.2.9-h21\", \"PAN-OS 10.2.9-h20\", \"PAN-OS 10.2.9-h19\", \"PAN-OS 10.2.9-h18\", \"PAN-OS 10.2.9-h17\", \"PAN-OS 10.2.9-h16\", \"PAN-OS 10.2.9-h15\", \"PAN-OS 10.2.9-h14\", \"PAN-OS 10.2.9-h13\", \"PAN-OS 10.2.9-h12\", \"PAN-OS 10.2.9-h11\", \"PAN-OS 10.2.9-h10\", \"PAN-OS 10.2.9-h9\", \"PAN-OS 10.2.9-h8\", \"PAN-OS 10.2.9-h7\", \"PAN-OS 10.2.9-h6\", \"PAN-OS 10.2.9-h5\", \"PAN-OS 10.2.9-h4\", \"PAN-OS 10.2.9-h3\", \"PAN-OS 10.2.9-h2\", \"PAN-OS 10.2.9-h1\", \"PAN-OS 10.2.9\", \"PAN-OS 10.2.8-h21\", \"PAN-OS 10.2.8-h20\", \"PAN-OS 10.2.8-h19\", \"PAN-OS 10.2.8-h18\", \"PAN-OS 10.2.8-h17\", \"PAN-OS 10.2.8-h16\", \"PAN-OS 10.2.8-h15\", \"PAN-OS 10.2.8-h14\", \"PAN-OS 10.2.8-h13\", \"PAN-OS 10.2.8-h12\", \"PAN-OS 10.2.8-h11\", \"PAN-OS 10.2.8-h10\", \"PAN-OS 10.2.8-h9\", \"PAN-OS 10.2.8-h8\", \"PAN-OS 10.2.8-h7\", \"PAN-OS 10.2.8-h6\", \"PAN-OS 10.2.8-h5\", \"PAN-OS 10.2.8-h4\", \"PAN-OS 10.2.8-h3\", \"PAN-OS 10.2.8-h2\", \"PAN-OS 10.2.8-h1\", \"PAN-OS 10.2.8\", \"PAN-OS 10.2.7-h24\", \"PAN-OS 10.2.7-h23\", \"PAN-OS 10.2.7-h22\", \"PAN-OS 10.2.7-h21\", \"PAN-OS 10.2.7-h20\", \"PAN-OS 10.2.7-h19\", \"PAN-OS 10.2.7-h18\", \"PAN-OS 10.2.7-h17\", \"PAN-OS 10.2.7-h16\", \"PAN-OS 10.2.7-h15\", \"PAN-OS 10.2.7-h14\", \"PAN-OS 10.2.7-h13\", \"PAN-OS 10.2.7-h12\", \"PAN-OS 10.2.7-h11\", \"PAN-OS 10.2.7-h10\", \"PAN-OS 10.2.7-h9\", \"PAN-OS 10.2.7-h8\", \"PAN-OS 10.2.7-h7\", \"PAN-OS 10.2.7-h6\", \"PAN-OS 10.2.7-h5\", \"PAN-OS 10.2.7-h4\", \"PAN-OS 10.2.7-h3\", \"PAN-OS 10.2.7-h2\", \"PAN-OS 10.2.7-h1\", \"PAN-OS 10.2.7\", \"PAN-OS 10.2.6-h6\", \"PAN-OS 10.2.6-h5\", \"PAN-OS 10.2.6-h4\", \"PAN-OS 10.2.6-h3\", \"PAN-OS 10.2.6-h2\", \"PAN-OS 10.2.6-h1\", \"PAN-OS 10.2.6\", \"PAN-OS 10.2.5-h9\", \"PAN-OS 10.2.5-h8\", \"PAN-OS 10.2.5-h7\", \"PAN-OS 10.2.5-h6\", \"PAN-OS 10.2.5-h5\", \"PAN-OS 10.2.5-h4\", \"PAN-OS 10.2.5-h3\", \"PAN-OS 10.2.5-h2\", \"PAN-OS 10.2.5-h1\", \"PAN-OS 10.2.5\", \"PAN-OS 10.2.4-h32\", \"PAN-OS 10.2.4-h31\", \"PAN-OS 10.2.4-h30\", \"PAN-OS 10.2.4-h29\", \"PAN-OS 10.2.4-h28\", \"PAN-OS 10.2.4-h27\", \"PAN-OS 10.2.4-h26\", \"PAN-OS 10.2.4-h25\", \"PAN-OS 10.2.4-h24\", \"PAN-OS 10.2.4-h23\", \"PAN-OS 10.2.4-h22\", \"PAN-OS 10.2.4-h21\", \"PAN-OS 10.2.4-h20\", \"PAN-OS 10.2.4-h19\", \"PAN-OS 10.2.4-h18\", \"PAN-OS 10.2.4-h17\", \"PAN-OS 10.2.4-h16\", \"PAN-OS 10.2.4-h15\", \"PAN-OS 10.2.4-h14\", \"PAN-OS 10.2.4-h13\", \"PAN-OS 10.2.4-h12\", \"PAN-OS 10.2.4-h11\", \"PAN-OS 10.2.4-h10\", \"PAN-OS 10.2.4-h9\", \"PAN-OS 10.2.4-h8\", \"PAN-OS 10.2.4-h7\", \"PAN-OS 10.2.4-h6\", \"PAN-OS 10.2.4-h5\", \"PAN-OS 10.2.4-h4\", \"PAN-OS 10.2.4-h3\", \"PAN-OS 10.2.4-h2\", \"PAN-OS 10.2.4-h1\", \"PAN-OS 10.2.4\", \"PAN-OS 10.2.3-h14\", \"PAN-OS 10.2.3-h13\", \"PAN-OS 10.2.3-h12\", \"PAN-OS 10.2.3-h11\", \"PAN-OS 10.2.3-h10\", \"PAN-OS 10.2.3-h9\", \"PAN-OS 10.2.3-h8\", \"PAN-OS 10.2.3-h7\", \"PAN-OS 10.2.3-h6\", \"PAN-OS 10.2.3-h5\", \"PAN-OS 10.2.3-h4\", \"PAN-OS 10.2.3-h3\", \"PAN-OS 10.2.3-h2\", \"PAN-OS 10.2.3-h1\", \"PAN-OS 10.2.3\", \"PAN-OS 10.2.2-h6\", \"PAN-OS 10.2.2-h5\", \"PAN-OS 10.2.2-h4\", \"PAN-OS 10.2.2-h3\", \"PAN-OS 10.2.2-h2\", \"PAN-OS 10.2.2-h1\", \"PAN-OS 10.2.2\", \"PAN-OS 10.2.1-h3\", \"PAN-OS 10.2.1-h2\", \"PAN-OS 10.2.1-h1\", \"PAN-OS 10.2.1\", \"PAN-OS 10.2.0-h4\", \"PAN-OS 10.2.0-h3\", \"PAN-OS 10.2.0-h2\", \"PAN-OS 10.2.0-h1\", \"PAN-OS 10.2.0\", \"PAN-OS 10.1.14-h10\", \"PAN-OS 10.1.14-h9\", \"PAN-OS 10.1.14-h8\", \"PAN-OS 10.1.14-h7\", \"PAN-OS 10.1.14-h6\", \"PAN-OS 10.1.14-h5\", \"PAN-OS 10.1.14-h4\", \"PAN-OS 10.1.14-h3\", \"PAN-OS 10.1.14-h2\", \"PAN-OS 10.1.14-h1\", \"PAN-OS 10.1.14\", \"PAN-OS 10.1.13-h5\", \"PAN-OS 10.1.13-h4\", \"PAN-OS 10.1.13-h3\", \"PAN-OS 10.1.13-h2\", \"PAN-OS 10.1.13-h1\", \"PAN-OS 10.1.13\", \"PAN-OS 10.1.12-h3\", \"PAN-OS 10.1.12-h2\", \"PAN-OS 10.1.12-h1\", \"PAN-OS 10.1.12\", \"PAN-OS 10.1.11-h10\", \"PAN-OS 10.1.11-h9\", \"PAN-OS 10.1.11-h8\", \"PAN-OS 10.1.11-h7\", \"PAN-OS 10.1.11-h6\", \"PAN-OS 10.1.11-h5\", \"PAN-OS 10.1.11-h4\", \"PAN-OS 10.1.11-h3\", \"PAN-OS 10.1.11-h2\", \"PAN-OS 10.1.11-h1\", \"PAN-OS 10.1.11\", \"PAN-OS 10.1.10-h9\", \"PAN-OS 10.1.10-h8\", \"PAN-OS 10.1.10-h7\", \"PAN-OS 10.1.10-h6\", \"PAN-OS 10.1.10-h5\", \"PAN-OS 10.1.10-h4\", \"PAN-OS 10.1.10-h3\", \"PAN-OS 10.1.10-h2\", \"PAN-OS 10.1.10-h1\", \"PAN-OS 10.1.10\", \"PAN-OS 10.1.9-h14\", \"PAN-OS 10.1.9-h13\", \"PAN-OS 10.1.9-h12\", \"PAN-OS 10.1.9-h11\", \"PAN-OS 10.1.9-h10\", \"PAN-OS 10.1.9-h9\", \"PAN-OS 10.1.9-h8\", \"PAN-OS 10.1.9-h7\", \"PAN-OS 10.1.9-h6\", \"PAN-OS 10.1.9-h5\", \"PAN-OS 10.1.9-h4\", \"PAN-OS 10.1.9-h3\", \"PAN-OS 10.1.9-h2\", \"PAN-OS 10.1.9-h1\", \"PAN-OS 10.1.9\", \"PAN-OS 10.1.8-h8\", \"PAN-OS 10.1.8-h7\", \"PAN-OS 10.1.8-h6\", \"PAN-OS 10.1.8-h5\", \"PAN-OS 10.1.8-h4\", \"PAN-OS 10.1.8-h3\", \"PAN-OS 10.1.8-h2\", \"PAN-OS 10.1.8-h1\", \"PAN-OS 10.1.8\", \"PAN-OS 10.1.7-h1\", \"PAN-OS 10.1.7\", \"PAN-OS 10.1.6-h9\", \"PAN-OS 10.1.6-h8\", \"PAN-OS 10.1.6-h7\", \"PAN-OS 10.1.6-h6\", \"PAN-OS 10.1.6-h5\", \"PAN-OS 10.1.6-h4\", \"PAN-OS 10.1.6-h3\", \"PAN-OS 10.1.6-h2\", \"PAN-OS 10.1.6-h1\", \"PAN-OS 10.1.6\", \"PAN-OS 10.1.5-h4\", \"PAN-OS 10.1.5-h3\", \"PAN-OS 10.1.5-h2\", \"PAN-OS 10.1.5-h1\", \"PAN-OS 10.1.5\", \"PAN-OS 10.1.4-h6\", \"PAN-OS 10.1.4-h5\", \"PAN-OS 10.1.4-h4\", \"PAN-OS 10.1.4-h3\", \"PAN-OS 10.1.4-h2\", \"PAN-OS 10.1.4-h1\", \"PAN-OS 10.1.4\", \"PAN-OS 10.1.3-h4\", \"PAN-OS 10.1.3-h3\", \"PAN-OS 10.1.3-h2\", \"PAN-OS 10.1.3-h1\", \"PAN-OS 10.1.3\", \"PAN-OS 10.1.2\", \"PAN-OS 10.1.1\", \"PAN-OS 10.1.0\"], \"providerMetadata\": {\"orgId\": \"d6c1279f-00f6-4ef7-9217-f89ffe703ec0\", \"shortName\": \"palo_alto\", \"dateUpdated\": \"2025-03-17T23:58:12.045Z\"}}}",
         cveMetadata: "{\"cveId\": \"CVE-2025-0116\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-03-17T23:58:12.045Z\", \"dateReserved\": \"2024-12-20T23:23:17.743Z\", \"assignerOrgId\": \"d6c1279f-00f6-4ef7-9217-f89ffe703ec0\", \"datePublished\": \"2025-03-12T18:34:38.222Z\", \"assignerShortName\": \"palo_alto\"}",
         dataType: "CVE_RECORD",
         dataVersion: "5.1",
      },
   },
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.