Palo Alto Networks Fixes Critical Vulnerabilities, Urges Tightened Security Measures

June 14, 2025
Palo Alto Networks Fixes Critical Vulnerabilities, Urges Tightened Security Measures
  • Additionally, Palo Alto Networks has resolved CVE-2025-4228, which exposed unencrypted SD-WAN data, and a privilege escalation vulnerability in the Cortex XDR Broker VM.

  • In total, Palo Alto Networks has fixed seven privilege escalation vulnerabilities and integrated the latest Chrome security patches into its products.

  • The company also addressed CVE-2025-4233, a cache vulnerability impacting the Prisma Access Browser, by implementing 11 Chrome security fixes.

  • Palo Alto Networks has recently addressed several vulnerabilities, including CVE-2025-4230, which is a command injection vulnerability with a CVSS score of 5.7, allowing authenticated administrators to execute commands as root through the PAN-OS CLI.

  • Another significant vulnerability, CVE-2025-4231, has a CVSS score of 6.1 and enables authenticated admins to perform command injection via the Management Web Interface, although it does not affect Cloud NGFW and Prisma Access.

  • The most critical issue identified is CVE-2025-4232, rated at 7.1 on the CVSS scale, which permits non-administrative users on macOS to escalate privileges to root through the log collection feature of the GlobalProtect app.

  • The core problem behind CVE-2025-4232 is attributed to improper neutralization of wildcards, highlighting the need for robust security measures.

  • Importantly, the company has stated that it is not aware of any active exploitation of these vulnerabilities in the wild.

  • To mitigate the risk associated with CVE-2025-4230, it is recommended that CLI access be restricted to a select group of administrators, with the assurance that Cloud NGFW and Prisma Access remain unaffected.

Summary based on 1 source


Get a daily email with more Tech stories

Source

Palo Alto Networks fixed multiple privilege escalation flaws

More Stories