We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-4229

PAN-OS: Traffic Information Disclosure Vulnerability



Description

An information disclosure vulnerability in the SD-WAN feature of Palo Alto Networks PAN-OS® software enables an unauthorized user to view unencrypted data sent from the firewall through the SD-WAN interface. This requires the user to be able to intercept packets sent from the firewall. Cloud NGFW and Prisma® Access are not affected by this vulnerability.

Reserved 2025-05-02 | Published 2025-06-13 | Updated 2025-06-13 | Assigner palo_alto


MEDIUM: 6.0CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/AU:N/R:U/V:D/U:Amber

Problem types

CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere

Product status

Default status
unaffected

All
unaffected

Default status
unaffected

11.2.0 before 11.2.7
affected

11.1.0 before 11.1.10
affected

10.2.0 before 10.2.17
affected

10.1.0 before 10.1.14-h16
affected

Default status
unaffected

All
unaffected

Timeline

2025-06-11:Initial Publication

Credits

MMS Technology finder

References

security.paloaltonetworks.com/CVE-2025-4229 vendor-advisory

cve.org (CVE-2025-4229)

nvd.nist.gov (CVE-2025-4229)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-4229

Support options

Helpdesk Chat, Email, Knowledgebase