Palo Alto Firewalls Vulnerable to Remote Reboot Attack via DoS Flaw

Palo Alto Networks Discloses PAN-OS Denial-of-Service Vulnerability (CVE-2025-4619) Allowing Remote Firewall Reboots

MEDIUM
November 14, 2025
4m read
VulnerabilityPatch Management

Related Entities

Organizations

Products & Tech

PAN-OSPA-SeriesVM-SeriesPrisma Access

CVE Identifiers

CVE-2025-4619
MEDIUM
CVSS:6.6

Full Report

Executive Summary

Palo Alto Networks has issued a security advisory for a medium-severity denial-of-service (DoS) vulnerability, CVE-2025-4619, in its PAN-OS software. The flaw allows an unauthenticated attacker on the network to trigger a firewall reboot by sending a specially crafted packet to the device's data plane. According to the advisory, repeated exploitation of this vulnerability can cause the firewall to enter maintenance mode, a state that halts packet processing and effectively takes the security appliance offline. This could lead to significant network disruption and leave an organization's perimeter undefended. The company has released patches and recommends immediate upgrades for affected customers.


Vulnerability Details

  • CVE ID: CVE-2025-4619
  • Description: A firewall denial-of-service (DoS) vulnerability caused by the improper handling of specially crafted packets.
  • CVSS 4.0 Score: 6.6 (Medium)
  • CVSS-B Score: 8.7 (High Business Impact)
  • Attack Vector: Network
  • Authentication: Not required
  • User Interaction: Not required

An attacker can exploit this vulnerability without any authentication. The issue resides in the firewall's data plane and is only present on devices that have either a URL proxy or any decrypt policy configured. Notably, traffic does not need to match a specific decryption rule for the vulnerability to be triggerable, broadening the scope of potentially affected devices.

The high CVSS-B score of 8.7 reflects the significant business impact of taking a perimeter firewall offline, which can halt all internet-facing business operations and disable critical security functions.


Affected Systems

The vulnerability affects the following Palo Alto Networks products running specific versions of PAN-OS:

  • Product Lines:
    • PA-Series (hardware firewalls)
    • VM-Series (virtualized firewalls)
    • Prisma Access
  • Affected PAN-OS Versions:
    • PAN-OS 10.2: versions up to 10.2.13
    • PAN-OS 11.1: versions up to 11.1.6
    • PAN-OS 11.2: versions before 11.2.5

Cloud NGFW deployments are not affected by this vulnerability.


Exploitation Status

As of the advisory's publication on November 14, 2025, Palo Alto Networks is not aware of any malicious exploitation of this vulnerability in the wild. However, given the unauthenticated nature of the flaw, proof-of-concept exploits may be developed quickly, increasing the risk to unpatched systems.


Impact Assessment

Successful exploitation of CVE-2025-4619 results in a denial-of-service condition. A single exploit action will cause the firewall to reboot. Persistent attacks can force the device into maintenance mode, which requires manual intervention to restore service. The business impact includes:

  • Network Outage: Disruption of all traffic passing through the firewall, including internet access, VPNs, and access to critical applications.
  • Security Blind Spot: While the firewall is rebooting or in maintenance mode, the network perimeter is unprotected, potentially allowing other malicious traffic to pass through unimpeded.
  • Operational Cost: Requires security and network teams to respond and manually recover the affected devices, consuming time and resources.

Detection Methods

Organizations can identify vulnerable systems by checking their PAN-OS version against the affected versions list. To detect exploitation attempts, security teams should:

  • Monitor Firewall Health: Implement monitoring to alert on unexpected firewall reboots or entry into maintenance mode.
  • Analyze Traffic Logs: While difficult without a specific signature, analyzing traffic logs for unusual or malformed packets directed at the firewall's data plane interfaces could potentially reveal attempts, though this is a low-fidelity method.

Remediation Steps

Palo Alto Networks has released software updates to address this vulnerability. There are no known workarounds.

  1. Upgrade PAN-OS: Customers with affected product lines and software versions should upgrade to a patched release as soon as possible. The fixed versions include:
    • PAN-OS 10.2.14 and later
    • PAN-OS 11.1.7 and later
    • PAN-OS 11.2.5 and later
  2. Verify Upgrade: After applying the patch, verify that the firewall is operating on a fixed version of PAN-OS.

Given that the vulnerability requires a URL proxy or decrypt policy, organizations could temporarily disable these features as an emergency measure if patching is not immediately possible, but this would significantly degrade the firewall's security capabilities and is not recommended as a long-term solution.

Timeline of Events

1
November 14, 2025
This article was published

MITRE ATT&CK Mitigations

The primary and only recommended mitigation is to upgrade PAN-OS to a patched version provided by Palo Alto Networks.

Mapped D3FEND Techniques:

While not a direct workaround, filtering traffic from untrusted sources to the firewall's management and data plane interfaces can reduce the attack surface, though it may not block a determined internal attacker.

D3FEND Defensive Countermeasures

The definitive countermeasure for CVE-2025-4619 is to apply the software updates provided by Palo Alto Networks. Given that this vulnerability affects critical perimeter security devices and can be triggered by an unauthenticated attacker, patching should be considered a high priority. Organizations should follow their established change management process to test and deploy the appropriate PAN-OS update (10.2.14+, 11.1.7+, or 11.2.5+) to all affected PA-Series and VM-Series firewalls. Because there are no workarounds, delaying this patch leaves the organization's network availability and security posture at significant risk. This action directly remediates the flaw in the packet processing engine, preventing the DoS condition.

As a detective control, organizations should implement monitoring and alerting for unexpected reboots of their Palo Alto Networks firewalls. This can be achieved by forwarding firewall system logs to a central SIEM and creating a rule that triggers a high-priority alert whenever a 'system reboot' or 'entering maintenance mode' event is logged without a corresponding change ticket or administrator action. While this does not prevent the initial DoS attack, it provides immediate notification of a potential security incident. This rapid detection allows the security operations team to investigate the cause, confirm if it was malicious exploitation of CVE-2025-4619, and take steps to block the source IP if identified, preventing the attacker from repeatedly triggering the reboot and forcing the device into a prolonged outage in maintenance mode.

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Palo Alto NetworksPAN-OSfirewallvulnerabilitydenial-of-serviceDoSCVE-2025-4619

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading