
CVE-2025-0120 – GlobalProtect App: Local Privilege Escalation (PE) Vulnerability
https://notcve.org/view.php?id=CVE-2025-0120
11 Apr 2025 — A vulnerability with a privilege management mechanism in the Palo Alto Networks GlobalProtect™ app on Windows devices allows a locally authenticated non-administrative Windows user to escalate their privileges to NT AUTHORITY\SYSTEM. However, execution requires that the local user can also successfully exploit a race condition, which makes this vulnerability difficult to exploit. • https://security.paloaltonetworks.com/CVE-2025-0120 • CWE-250: Execution with Unnecessary Privileges •

CVE-2025-0118 – GlobalProtect App: Execution of Unsafe ActiveX Control Vulnerability
https://notcve.org/view.php?id=CVE-2025-0118
12 Mar 2025 — A vulnerability in the Palo Alto Networks GlobalProtect app on Windows allows a remote attacker to run ActiveX controls within the context of an authenticated Windows user. This enables the attacker to run commands as if they are a legitimate authenticated user. However, to exploit this vulnerability, the authenticated user must navigate to a malicious page during the GlobalProtect SAML login process on a Windows device. This issue does not apply to the GlobalProtect app on other (non-Windows) platforms. • https://security.paloaltonetworks.com/CVE-2025-0118 • CWE-618: Exposed Unsafe ActiveX Method •

CVE-2025-0117 – GlobalProtect App: Local Privilege Escalation (PE) Vulnerability
https://notcve.org/view.php?id=CVE-2025-0117
12 Mar 2025 — A reliance on untrusted input for a security decision in the GlobalProtect app on Windows devices potentially enables a locally authenticated non-administrative Windows user to escalate their privileges to NT AUTHORITY\SYSTEM. GlobalProtect App on macOS, Linux, iOS, Android, Chrome OS and GlobalProtect UWP App are not affected. • https://security.paloaltonetworks.com/CVE-2025-0117 • CWE-807: Reliance on Untrusted Inputs in a Security Decision •

CVE-2025-0116 – PAN-OS: Firewall Denial of Service (DoS) Using a Specially Crafted LLDP Frame
https://notcve.org/view.php?id=CVE-2025-0116
12 Mar 2025 — A Denial of Service (DoS) vulnerability in Palo Alto Networks PAN-OS software causes the firewall to unexpectedly reboot when processing a specially crafted LLDP frame sent by an unauthenticated adjacent attacker. Repeated attempts to initiate this condition causes the firewall to enter maintenance mode. This issue does not apply to Cloud NGFWs or Prisma Access software. • https://security.paloaltonetworks.com/CVE-2025-0116 • CWE-754: Improper Check for Unusual or Exceptional Conditions •

CVE-2025-0115 – PAN-OS: Authenticated Admin File Read Vulnerability in PAN-OS CLI
https://notcve.org/view.php?id=CVE-2025-0115
12 Mar 2025 — A vulnerability in the Palo Alto Networks PAN-OS software enables an authenticated admin on the PAN-OS CLI to read arbitrary files. This issue does not affect Cloud NGFW or Prisma Access. A vulnerability in the Palo Alto Networks PAN-OS software enables an authenticated admin on the PAN-OS CLI to read arbitrary files. The attacker must have network access to the management interface (web, SSH, console, or telnet) and successfully authenticate to exploit this issue. You can greatly reduce the risk of this is... • https://security.paloaltonetworks.com/CVE-2025-0115 • CWE-41: Improper Resolution of Path Equivalence •

CVE-2025-0114 – PAN-OS: Denial of Service (DoS) in GlobalProtect
https://notcve.org/view.php?id=CVE-2025-0114
12 Mar 2025 — A Denial of Service (DoS) vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software enables an unauthenticated attacker to render the service unavailable by sending a large number of specially crafted packets over a period of time. This issue affects both the GlobalProtect portal and the GlobalProtect gateway. This issue does not apply to Cloud NGFWs or Prisma Access software. • https://security.paloaltonetworks.com/CVE-2025-0114 • CWE-400: Uncontrolled Resource Consumption •

CVE-2025-0112 – Cortex XDR Agent: Local Windows User Can Disable the Agent
https://notcve.org/view.php?id=CVE-2025-0112
19 Feb 2025 — A problem with a detection mechanism in the Palo Alto Networks Cortex XDR agent on Windows devices enables a user with Windows non-administrative privileges to disable the agent. This vulnerability can also be leveraged by malware to disable the Cortex XDR agent and then perform malicious activity. • https://security.paloaltonetworks.com/CVE-2025-0112 • CWE-754: Improper Check for Unusual or Exceptional Conditions •

CVE-2025-0113 – Cortex XDR Broker VM: Unauthorized Access to Broker VM Docker Containers
https://notcve.org/view.php?id=CVE-2025-0113
12 Feb 2025 — A problem with the network isolation mechanism of the Palo Alto Networks Cortex XDR Broker VM allows attackers unauthorized access to Docker containers from the host network used by Broker VM. This may allow access to read files sent for analysis and logs transmitted by the Cortex XDR Agent to the Cortex XDR server. • https://security.paloaltonetworks.com/CVE-2024-0113 • CWE-424: Improper Protection of Alternate Path •

CVE-2025-0110 – PAN-OS OpenConfig Plugin: Command Injection Vulnerability in OpenConfig Plugin
https://notcve.org/view.php?id=CVE-2025-0110
12 Feb 2025 — A command injection vulnerability in the Palo Alto Networks PAN-OS OpenConfig plugin enables an authenticated administrator with the ability to make gNMI requests to the PAN-OS management web interface to bypass system restrictions and run arbitrary commands. The commands are run as the “__openconfig” user (which has the Device Administrator role) on the firewall. You can greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses accordi... • https://security.paloaltonetworks.com/CVE-2025-0110 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVE-2025-0111 – Palo Alto Networks PAN-OS File Read Vulnerability
https://notcve.org/view.php?id=CVE-2025-0111
12 Feb 2025 — An authenticated file read vulnerability in the Palo Alto Networks PAN-OS software enables an authenticated attacker with network access to the management web interface to read files on the PAN-OS filesystem that are readable by the “nobody” user. You can greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended best practices deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-am... • https://security.paloaltonetworks.com/CVE-2025-0111 • CWE-73: External Control of File Name or Path •