We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A denial-of-service (DoS) vulnerability in the Simple Certificate Enrollment Protocol (SCEP) authentication feature of Palo Alto Networks PAN-OS® software enables an unauthenticated attacker to initiate system reboots using a maliciously crafted packet. Repeated attempts to initiate a reboot causes the firewall to enter maintenance mode. Cloud NGFW is not affected by this vulnerability. Prisma® Access software is proactively patched and protected from this issue.
Reserved 2024-12-20 | Published 2025-04-11 | Updated 2025-04-11 | Assigner palo_altoA user sends a malicious crafted packet through the firewall, which processes a malicious packet that causes this issue.
For Prisma Access, this issue can only be initiated by authenticated end users that use a maliciously crafted packet.
CWE-754 Improper Check for Unusual or Exceptional Conditions
2025-04-09: | Initial Publication |
Abyss Watcher
security.paloaltonetworks.com/CVE-2025-0128
Support options