CVE-2025-2182

MEDIUM

Palo Alto Networks PAN-OS - Info Disclosure

Title source: llm
STIX 2.1

Description

A problem with the implementation of the MACsec protocol in Palo Alto Networks PAN-OS® results in the cleartext exposure of the connectivity association key (CAK). This issue is only applicable to PA-7500 Series devices which are in an NGFW cluster. A user who possesses this key can read messages being sent between devices in a NGFW Cluster. There is no impact in non-clustered firewalls or clusters of firewalls that do not enable MACsec.

Scores

CVSS v4 5.6
EPSS 0.0002
EPSS Percentile 4.8%
CVSS:4.0/AV:P/AC:L/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/AU:N/R:A/V:D/RE:M/U:Amber

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-312
Status published
Products (7)
Palo Alto Networks/Cloud NGFW All - 3.2.449
Palo Alto Networks/PAN-OS 10.1.0
Palo Alto Networks/PAN-OS 10.2.0
Palo Alto Networks/PAN-OS 11.1.0 - 11.1.10
Palo Alto Networks/PAN-OS 11.2.0 - 11.2.8
Palo Alto Networks/PAN-OS All
Palo Alto Networks/Prisma Access All
Published Aug 13, 2025
Tracked Since Feb 18, 2026