Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Palo Alto Networks | Cloud NGFW | - | - | |
| Palo Alto Networks | PAN-OS | 10.1.0 ~ 10.1.14-h9 | cpe:2.3:o:paloaltonetworks:pan-os:11.2.4:h3:*:*:*:*:*:* | |
| Palo Alto Networks | Prisma Access | - | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Palo Alto Networks PAN-OS 身份验证绕过漏洞批量检测脚本(CVE-2025-0108) | https://github.com/iSee857/CVE-2025-0108-PoC | POC Details |
| 2 | This repository contains a Proof of Concept (PoC) for the **CVE-2025-0108** vulnerability, which is an **authentication bypass** issue in Palo Alto Networks' PAN-OS software. The scripts provided here test for the vulnerability by sending a crafted HTTP request to the target systems. | https://github.com/FOLKS-iwd/CVE-2025-0108-PoC | POC Details |
| 3 | Detects an authentication bypass vulnerability in Palo Alto PAN-OS (CVE-2025-0108). | https://github.com/fr4nc1stein/CVE-2025-0108-SCAN | POC Details |
| 4 | None | https://github.com/barcrange/PAN-OS-Authentication-Bypass-Checker-CVE-2025-0108- | POC Details |
| 5 | None | https://github.com/barcrange/CVE-2025-0108-Authentication-Bypass-checker | POC Details |
| 6 | PAN-OS CVE POC SCRIPT | https://github.com/sohaibeb/CVE-2025-0108 | POC Details |
| 7 | NSE script that checks for CVE-2025-0108 vulnerability in Palo Alto Networks PAN-OS | https://github.com/becrevex/CVE-2025-0108 | POC Details |
| 8 | A vulnerability in PAN-OS management interface allows authentication bypass through path confusion between Nginx and Apache handlers.The issue occurs due to differences in path processing between Nginx and Apache, where double URL encoding combined with directory traversal can bypass authentication checks enforced by X-pan-AuthCheck header. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-0108.yaml | POC Details |
| 9 | CVE-2025-0108 | https://github.com/B1ack4sh/Blackash-CVE-2025-0108 | POC Details |
| 10 | CVE-2025-0108 | https://github.com/Ashwesker/Blackash-CVE-2025-0108 | POC Details |
| 11 | None | https://github.com/kso4more/CVE-2025-0108 | POC Details |
| 12 | CVE-2025-0108 | https://github.com/Ashwesker/Ashwesker-CVE-2025-0108 | POC Details |
No public POC found.
Login to generate AI POC| CVE-2025-0111 | PAN-OS: Authenticated File Read Vulnerability in the Management Web Interface | |
| CVE-2025-0109 | PAN-OS: Unauthenticated File Deletion Vulnerability on the Management Web Interface | |
| CVE-2025-0113 | Cortex XDR Broker VM: Unauthorized Access to Broker VM Docker Containers | |
| CVE-2025-0110 | PAN-OS OpenConfig Plugin: Command Injection Vulnerability in OpenConfig Plugin |
No comments yet