Palo Alto Security Updates – 10 July 2025

Palo Alto has released security updates to fix several vulnerabilities affecting multiple Palo Alto products.

The addressed vulnerabilities could allow the attacker to bypass security restrictions, obtain sensitive information, or gain elevated privileges on the affected system.

Sample of the addressed vulnerabilities:

1. Palo Alto GlobalProtect Authenticated Code Injection Vulnerability (CVE-2025-4232):

  • CVSS: 7.1
  • Attack Vector: Local
  • Attack Complexity: Low
  • Privileges Required: Low
  • User Interaction: None
  • Consequences: Gain Privilege

2. PAN-OS Authenticated Admin Command Injection Vulnerability in the Management Web Interface (CVE-2025-4231):

  • CVSS: 6.1
  • Attack Vector: Network
  • Attack Complexity: Low
  • Privileges Required: High
  • User Interaction: None
  • Consequences: Gain Privilege

The Affected Products:

  • Palo Alto GlobalProtect App.
  • Palo Alto Cortex XDR.
  • PAN-OS.
  • Palo Alto Autonomous Digital Experience Manager.
Vulnerabilities
  • CVE-2025-4227
  • CVE-2025-4230
  • CVE-2025-0141
  • CVE-2025-4228
  • CVE-2025-4229
  • CVE-2025-4231
  • CVE-2025-4232
  • CVE-2025-0140
  • CVE-2025-0139
Mitigations

The enterprise should deploy this patch as soon as the testing phase is completed.

Palo Alto Security Advisory

References