CVE-2025-0126

HIGH

PAN-OS - Session Fixation

Title source: llm
STIX 2.1

Description

When configured using SAML, a session fixation vulnerability in the GlobalProtect™ login enables an attacker to impersonate a legitimate authorized user and perform actions as that GlobalProtect user. This requires the legitimate user to first click on a malicious link provided by the attacker. The SAML login for the PAN-OS® management interface is not affected. Additionally, this issue does not affect Cloud NGFW and all Prisma® Access instances are proactively patched.

Scores

CVSS v4 8.3
EPSS 0.0036
EPSS Percentile 58.0%
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:H/SC:H/SI:N/SA:N/AU:N/R:U/V:D/RE:M/U:Amber

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-384
Status published
Products (8)
Palo Alto Networks/Cloud NGFW All
Palo Alto Networks/PAN-OS 10.1.0 - 10.1.14-h11
Palo Alto Networks/PAN-OS 10.2.0 - 10.2.10-h6
Palo Alto Networks/PAN-OS 11.0.0 - 11.0.6
Palo Alto Networks/PAN-OS 11.1.0 - 11.1.5
Palo Alto Networks/PAN-OS 11.2.0 - 11.2.3
Palo Alto Networks/Prisma Access 10.2.0 - 10.2.4-h36
Palo Alto Networks/Prisma Access 11.2.0 - 11.2.4-h5
Published Apr 11, 2025
Tracked Since Feb 18, 2026