Home

Description

An information disclosure vulnerability in Palo Alto Networks PAN-OS® software enables an authenticated administrator to view session tokens of users authenticated to the firewall web UI. This may allow impersonation of users whose session tokens are leaked.   The security risk posed by this issue is significantly minimized when CLI access is restricted to a limited group of administrators. Cloud NGFW and Prisma® Access are not affected by this vulnerability.

PUBLISHED Reserved 2025-05-12 | Published 2025-10-09 | Updated 2025-10-09 | Assigner palo_alto




MEDIUM: 4.8CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N/AU:N/R:U/V:C/RE:M/U:Amber

Problem types

CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere

Product status

Default status
unaffected

All
unaffected

Default status
unaffected

12.1.0
unaffected

11.2.0 before 11.2.8
affected

11.1.0 before 11.1.12
affected

10.2.0 before 10.2.17
affected

Default status
unaffected

All
unaffected

Timeline

2025-10-08:Initial Publication

Credits

Visa Inc. finder

References

security.paloaltonetworks.com/CVE-2025-4614 vendor-advisory

cve.org (CVE-2025-4614)

nvd.nist.gov (CVE-2025-4614)

Download JSON