CVE-2025-0128: PAN-OS: Firewall Denial of Service (DoS) Using a Specially Crafted Packet

8.7 CVSS

Description

A denial-of-service (DoS) vulnerability in the Simple Certificate Enrollment Protocol (SCEP) authentication feature of Palo Alto Networks PAN-OS® software enables an unauthenticated attacker to initiate system reboots using a maliciously crafted packet. Repeated attempts to initiate a reboot causes the firewall to enter maintenance mode.

Cloud NGFW is not affected by this vulnerability. Prisma® Access software is proactively patched and protected from this issue.

Classification

CVE ID: CVE-2025-0128

CVSS Base Severity: HIGH

CVSS Base Score: 8.7

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/AU:Y/R:U/V:C/RE:M/U:Amber

Problem Types

CWE-754 Improper Check for Unusual or Exceptional Conditions

Affected Products

Vendor: Palo Alto Networks, Palo Alto Networks, Palo Alto Networks

Product: Cloud NGFW, PAN-OS, Prisma Access

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.03% (probability of being exploited)

EPSS Percentile: 5.23% (scored less or equal to compared to others)

EPSS Date: 2025-04-20 (when was this score calculated)

References

https://nvd.nist.gov/vuln/detail/CVE-2025-0128
https://security.paloaltonetworks.com/CVE-2025-0128

Timeline