Palo Alto Networks Fixes Critical Vulnerabilities, Urges Tightened Security Measures
June 14, 2025
Additionally, Palo Alto Networks has resolved CVE-2025-4228, which exposed unencrypted SD-WAN data, and a privilege escalation vulnerability in the Cortex XDR Broker VM.
In total, Palo Alto Networks has fixed seven privilege escalation vulnerabilities and integrated the latest Chrome security patches into its products.
The company also addressed CVE-2025-4233, a cache vulnerability impacting the Prisma Access Browser, by implementing 11 Chrome security fixes.
Palo Alto Networks has recently addressed several vulnerabilities, including CVE-2025-4230, which is a command injection vulnerability with a CVSS score of 5.7, allowing authenticated administrators to execute commands as root through the PAN-OS CLI.
Another significant vulnerability, CVE-2025-4231, has a CVSS score of 6.1 and enables authenticated admins to perform command injection via the Management Web Interface, although it does not affect Cloud NGFW and Prisma Access.
The most critical issue identified is CVE-2025-4232, rated at 7.1 on the CVSS scale, which permits non-administrative users on macOS to escalate privileges to root through the log collection feature of the GlobalProtect app.
The core problem behind CVE-2025-4232 is attributed to improper neutralization of wildcards, highlighting the need for robust security measures.
Importantly, the company has stated that it is not aware of any active exploitation of these vulnerabilities in the wild.
To mitigate the risk associated with CVE-2025-4230, it is recommended that CLI access be restricted to a select group of administrators, with the assurance that Cloud NGFW and Prisma Access remain unaffected.
Summary based on 1 source
Get a daily email with more Tech stories
Source

Security Affairs • Jun 14, 2025
Palo Alto Networks fixed multiple privilege escalation flaws