<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: reduce exposure to PAN-OS vulnerabilities like CVE-2025-0111 in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/reduce-exposure-to-pan-os-vulnerabilities-like-cve-2025-0111/m-p/1235954#M2466</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/871573355"&gt;@tofu159mac&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="citation-50"&gt;In a lot of cases following best practices will provide you a lot of protection.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="citation-49 citation-end-49"&gt;CVE-2025-0111 is an authenticated file read vulnerability that affects the firewall's management interface.&lt;/SPAN&gt; &lt;SPAN class="citation-48 citation-end-48"&gt;The primary risk is when this interface is accessible from external or untrusted networks.&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;You greatly reduce the risk if you ensure that you allow only trusted internal IP addresses to access the management interface.&lt;/SPAN&gt;&lt;/P&gt;
&lt;DIV class="source-inline-chip-container ng-star-inserted"&gt;This can be done by configuring a management profile on the management interface or any data plane interface that has management access enabled. The profile should only allow access from specific trusted internal subnets or a dedicated jump host.&amp;nbsp;&amp;nbsp;Also ensure that you do not have any security policies that allow traffic from the &lt;STRONG&gt;untrust&lt;/STRONG&gt; zone to the management IP address. &lt;SPAN class="citation-45 citation-end-45"&gt;If the management interface is exposed to the internet, your risk is at its highest.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I strongly recommend subscribing to Palo Alto Networks' security advisories for recommendations/updates on CVE's like the one you mentioned:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://security.paloaltonetworks.com/CVE-2025-0111" target="_blank"&gt;https://security.paloaltonetworks.com/CVE-2025-0111&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind regards,&lt;/P&gt;
&lt;P&gt;Kim.&lt;/P&gt;</description>
    <pubDate>Wed, 13 Aug 2025 14:56:14 GMT</pubDate>
    <dc:creator>kiwi</dc:creator>
    <dc:date>2025-08-13T14:56:14Z</dc:date>
    <item>
      <title>reduce exposure to PAN-OS vulnerabilities like CVE-2025-0111</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/reduce-exposure-to-pan-os-vulnerabilities-like-cve-2025-0111/m-p/1235882#M2465</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What immediate steps should network admins take to reduce exposure to PAN-OS vulnerabilities like CVE-2025-0111 when no official patch is yet available?&lt;/P&gt;</description>
      <pubDate>Wed, 13 Aug 2025 04:44:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/reduce-exposure-to-pan-os-vulnerabilities-like-cve-2025-0111/m-p/1235882#M2465</guid>
      <dc:creator>tofu159mac</dc:creator>
      <dc:date>2025-08-13T04:44:57Z</dc:date>
    </item>
    <item>
      <title>Re: reduce exposure to PAN-OS vulnerabilities like CVE-2025-0111</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/reduce-exposure-to-pan-os-vulnerabilities-like-cve-2025-0111/m-p/1235954#M2466</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/871573355"&gt;@tofu159mac&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="citation-50"&gt;In a lot of cases following best practices will provide you a lot of protection.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="citation-49 citation-end-49"&gt;CVE-2025-0111 is an authenticated file read vulnerability that affects the firewall's management interface.&lt;/SPAN&gt; &lt;SPAN class="citation-48 citation-end-48"&gt;The primary risk is when this interface is accessible from external or untrusted networks.&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;You greatly reduce the risk if you ensure that you allow only trusted internal IP addresses to access the management interface.&lt;/SPAN&gt;&lt;/P&gt;
&lt;DIV class="source-inline-chip-container ng-star-inserted"&gt;This can be done by configuring a management profile on the management interface or any data plane interface that has management access enabled. The profile should only allow access from specific trusted internal subnets or a dedicated jump host.&amp;nbsp;&amp;nbsp;Also ensure that you do not have any security policies that allow traffic from the &lt;STRONG&gt;untrust&lt;/STRONG&gt; zone to the management IP address. &lt;SPAN class="citation-45 citation-end-45"&gt;If the management interface is exposed to the internet, your risk is at its highest.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I strongly recommend subscribing to Palo Alto Networks' security advisories for recommendations/updates on CVE's like the one you mentioned:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://security.paloaltonetworks.com/CVE-2025-0111" target="_blank"&gt;https://security.paloaltonetworks.com/CVE-2025-0111&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind regards,&lt;/P&gt;
&lt;P&gt;Kim.&lt;/P&gt;</description>
      <pubDate>Wed, 13 Aug 2025 14:56:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/reduce-exposure-to-pan-os-vulnerabilities-like-cve-2025-0111/m-p/1235954#M2466</guid>
      <dc:creator>kiwi</dc:creator>
      <dc:date>2025-08-13T14:56:14Z</dc:date>
    </item>
  </channel>
</rss>

