{ "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", "CVE_data_meta": { "ID": "CVE-2025-0123", "ASSIGNER": "psirt@paloaltonetworks.com", "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the Palo Alto Networks PAN-OS\u00ae software enables unlicensed administrators to view clear-text data captured using the packet capture feature https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-admin/monitoring/take-packet-captures/take-a-custom-packet-capture in decrypted HTTP/2 data streams traversing network interfaces on the firewall. HTTP/1.1 data streams are not impacted.\n\nIn normal conditions, decrypted packet captures are available to firewall administrators after they obtain and install a free Decryption Port Mirror license. The license requirement ensures that this feature can only be used after approved personnel purposefully activate the license. For more information, review how to configure decryption port mirroring https://docs.paloaltonetworks.com/network-security/decryption/administration/monitoring-decryption/configure-decryption-port-mirroring .\n\nThe administrator must obtain network access to the management interface (web, SSH, console, or telnet) and successfully authenticate to exploit this issue. Risk of this issue can be greatly reduced by restricting access to the management interface to only trusted administrators and from only internal IP addresses according to our recommended critical deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 .\n\nCustomer firewall administrators do not have access to the packet capture feature in Cloud NGFW. This feature is available only to authorized Palo Alto Networks personnel permitted to perform troubleshooting.\n\nPrisma\u00ae Access is not impacted by this vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-312 Cleartext Storage of Sensitive Information", "cweId": "CWE-312" } ] } ] }, "affects": { "vendor": { "vendor_data": [ { "vendor_name": "Palo Alto Networks", "product": { "product_data": [ { "product_name": "Cloud NGFW", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "versions": [ { "status": "unaffected", "version": "All", "versionType": "custom" } ], "defaultStatus": "unaffected" } } ] } }, { "product_name": "PAN-OS", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "versions": [ { "changes": [ { "at": "11.2.6", "status": "unaffected" } ], "lessThan": "11.2.6", "status": "affected", "version": "11.2.0", "versionType": "custom" }, { "changes": [ { "at": "11.1.8", "status": "unaffected" } ], "lessThan": "11.1.8", "status": "affected", "version": "11.1.0", "versionType": "custom" }, { "changes": [ { "at": "10.2.15", "status": "unaffected" } ], "lessThan": "10.2.15", "status": "affected", "version": "10.2.0", "versionType": "custom" }, { "changes": [ { "at": "10.1.14-h13", "status": "unaffected" } ], "lessThan": "10.1.14-h13", "status": "affected", "version": "10.1.0", "versionType": "custom" } ], "defaultStatus": "unaffected" } } ] } }, { "product_name": "Prisma Access", "version": { "version_data": [ { "version_value": "not down converted", "x_cve_json_5_version_data": { "versions": [ { "status": "unaffected", "version": "All", "versionType": "custom" } ], "defaultStatus": "unaffected" } } ] } } ] } } ] } }, "references": { "reference_data": [ { "url": "https://security.paloaltonetworks.com/CVE-2025-0123", "refsource": "MISC", "name": "https://security.paloaltonetworks.com/CVE-2025-0123" } ] }, "generator": { "engine": "Vulnogram 0.1.0-dev" }, "source": { "defect": [ "PAN-257442" ], "discovery": "INTERNAL" }, "configuration": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "This vulnerability requires the following configuration:
> set cli config-output-format set
> configure
# show | match 'http2 enable no'
Version | Minor Version | Suggested Solution |
---|---|---|
PAN-OS 11.2 | 11.2.0 through 11.2.5 | Upgrade to 11.2.6 or later. |
PAN-OS 11.1 | 11.1.0 through 11.1.7 | Upgrade to 11.1.8 or later. |
PAN-OS 11.0 (EoL) | Upgrade to a supported fixed version. | |
PAN-OS 10.2 | 10.2.0 through 10.2.14 | Upgrade to 10.2.15 or later. |
PAN-OS 10.1 | 10.1.0 through 10.1.14-h11 | Upgrade to 10.1.14-h13 or later. |
All other older unsupported PAN-OS versions | Upgrade to a supported fixed version. |
Using the Web Interface:
1. Select Monitor > Packet Capture > Captured Files > (Select All) and Delete the files.Using the PAN-OS CLI:
1. Enter the following operational command:> delete debug-filter file *
2. A confirmation prints to the terminal and indicates that all packet capture files were successfully deleted from the firewall:successfully removed *
" } ], "value": "This issue is fixed in PAN-OS 10.1.14-h13, PAN-OS 10.2.15, PAN-OS 11.1.8, PAN-OS 11.2.6, and all later PAN-OS versions.\n\nVersion\nMinor Version\nSuggested Solution\nPAN-OS 11.2\n11.2.0 through 11.2.5Upgrade to 11.2.6 or later.\nPAN-OS 11.111.1.0 through 11.1.7\nUpgrade to 11.1.8 or later.PAN-OS 11.0 (EoL)\n\nUpgrade to a supported fixed version.\nPAN-OS 10.2\n10.2.0 through 10.2.14\nUpgrade to 10.2.15 or later.\n\nPAN-OS 10.1\n10.1.0 through 10.1.14-h11\nUpgrade to 10.1.14-h13 or later.\nAll other older\nunsupported\nPAN-OS versions\u00a0Upgrade to a supported fixed version.\nTo fully remediate risk, you must delete all pre-existing packet capture files stored on the firewall after you upgrade to a fixed PAN-OS version. This task can be performed through the PAN-OS web interface or through the PAN-OS CLI.Using the Web Interface:\n\n1. Select Monitor > Packet Capture > Captured Files > (Select All) and Delete the files.\n2. Select Yes when prompted by the confirmation dialog.Using the PAN-OS CLI:\n\n1. Enter the following operational command:\n> delete debug-filter file *\u00a0\n\n2. A confirmation prints to the terminal and indicates that all packet capture files were successfully deleted from the firewall:\nsuccessfully removed *" } ], "credits": [ { "lang": "en", "value": "Saurabh Tripathi of Palo Alto Networks" } ] }