CVE-2025-0123

A vulnerability in the Palo Alto Networks PAN-OS® software enables unlicensed administrators to view clear-text data captured using the packet capture feature https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-admin/monitoring/take-packet-captures/take-a-custom-packet-capture in decrypted HTTP/2 data streams traversing network interfaces on the firewall. HTTP/1.1 data streams are not impacted. In normal conditions, decrypted packet captures are available to firewall administrators after they obtain and install a free Decryption Port Mirror license. The license requirement ensures that this feature can only be used after approved personnel purposefully activate the license. For more information, review how to configure decryption port mirroring https://docs.paloaltonetworks.com/network-security/decryption/administration/monitoring-decryption/configure-decryption-port-mirroring . The administrator must obtain network access to the management interface (web, SSH, console, or telnet) and successfully authenticate to exploit this issue. Risk of this issue can be greatly reduced by restricting access to the management interface to only trusted administrators and from only internal IP addresses according to our recommended critical deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 . Customer firewall administrators do not have access to the packet capture feature in Cloud NGFW. This feature is available only to authorized Palo Alto Networks personnel permitted to perform troubleshooting. Prisma® Access is not impacted by this vulnerability.
CVSS

No CVSS.

Configurations

No configuration.

History

15 Apr 2026, 00:35

Type Values Removed Values Added
Summary
  • (es) Una vulnerabilidad en el software PAN-OS® de Palo Alto Networks permite a administradores sin licencia ver datos de texto sin cifrar capturados mediante la función de captura de paquetes (https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-admin/monitoring/take-packet-captures/take-a-custom-packet-capture) en flujos de datos HTTP/2 descifrados que atraviesan las interfaces de red del firewall. Los flujos de datos HTTP/1.1 no se ven afectados. Normalmente, los administradores del firewall pueden acceder a las capturas de paquetes descifradas tras obtener e instalar una licencia gratuita de Decryption Port Mirror. El requisito de la licencia garantiza que esta función solo se pueda utilizar después de que personal autorizado la active intencionadamente. Para obtener más información, consulte cómo configurar la duplicación de puertos de descifrado (https://docs.paloaltonetworks.com/network-security/decryption/administration/monitoring-decryption/configure-decryption-port-mirroring). El administrador debe obtener acceso de red a la interfaz de administración (web, SSH, consola o Telnet) y autenticarse correctamente para explotar este problema. El riesgo de este problema se puede reducir considerablemente restringiendo el acceso a la interfaz de administración únicamente a administradores de confianza y solo desde direcciones IP internas, según nuestras directrices de implementación crítica recomendadas (https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431). Los administradores de firewall del cliente no tienen acceso a la función de captura de paquetes en Cloud NGFW. Esta función solo está disponible para el personal autorizado de Palo Alto Networks con permiso para realizar la resolución de problemas. Prisma® Access no se ve afectado por esta vulnerabilidad.

11 Apr 2025, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-11 18:15

Updated : 2026-04-15 00:35


NVD link : CVE-2025-0123

Mitre link : CVE-2025-0123

CVE.ORG link : CVE-2025-0123


JSON object : View

Products Affected

No product.

CWE
CWE-312

Cleartext Storage of Sensitive Information