CVE-2025-0136

MEDIUM

Palo Alto Networks PAN-OS - Info Disclosure

Title source: llm
STIX 2.1

Description

Using the AES-128-CCM algorithm for IPSec on certain Palo Alto Networks PAN-OS® firewalls (PA-7500, PA-5400, PA-5400f, PA-3400, PA-1600, PA-1400, and PA-400 Series) leads to unencrypted data transfer to devices that are connected to the PAN-OS firewall through IPSec. This issue does not affect Cloud NGFWs, Prisma® Access instances, or PAN-OS VM-Series firewalls. NOTE: The AES-128-CCM encryption algorithm is not recommended for use.

Scores

CVSS v4 5.3
EPSS 0.0009
EPSS Percentile 25.5%
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/AU:N/R:U/V:C/RE:M/U:Amber

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-319
Status published
Products (7)
Palo Alto Networks/Cloud NGFW All
Palo Alto Networks/PAN-OS 10.1.0 - 10.1.14-h14
Palo Alto Networks/PAN-OS 10.2.0 - 10.2.11
Palo Alto Networks/PAN-OS 11.0.0 - 11.0.7
Palo Alto Networks/PAN-OS 11.1.0 - 11.1.5
Palo Alto Networks/PAN-OS 11.2.0
Palo Alto Networks/Prisma Access All
Published May 14, 2025
Tracked Since Feb 18, 2026