Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Palo Alto Networks Patches Privilege Escalation Vulnerabilities

Palo Alto Networks has released patches for seven vulnerabilities and incorporated the latest Chrome fixes in its products.

Palo Alto firewall vulnerabilities

Palo Alto Networks on Wednesday published seven security advisories that detail as many vulnerabilities in its products, along with the implementation of recent Chrome fixes.

The most severe of the resolved flaws is CVE-2025-4232, a high-severity improper neutralization of wildcards bug in GlobalProtect for macOS that leads to code injection.

Impacting the log collection feature of the application, the security defect can be exploited by authenticated attackers to elevate their privileges to root, Palo Alto Networks warns.

The company also drew attention to a set of 11 Chrome fixes it implemented in its products alongside a patch for CVE-2025-4233, an inappropriate implementation in cache vulnerability affecting the Prisma Access Browser.

Patches were also released for a medium-severity command injection flaw in PAN-OS, tracked as CVE-2025-4231, that allows an attacker authenticated as an administrator to perform actions as root.

“The attacker must have network access to the management web interface and successfully authenticate to exploit this issue,” the company says.

Another PAN-OS command injection bug, CVE-2025-4230, allows an attacker logged into an administrator account with access to the CLI to bypass system restrictions and execute arbitrary commands as root.

“The security risk posed by this issue is significantly minimized when CLI access is restricted to a limited group of administrators,” Palo Alto Networks says.

Advertisement. Scroll to continue reading.

The company has also resolved a PAN-OS defect that could allow users able to intercept packets sent from the firewall to view unencrypted data being sent through the SD-WAN interface, and an incorrect privilege assignment issue in Cortex XDR Broker VM allowing attackers to escalate their privileges to root.

Additionally, the company fixed an improper access control flaw in the Endpoint Traffic Policy Enforcement feature of GlobalProtect for Windows and macOS, leading to packets remaining unencrypted and allowing an attacker with physical access to the network to inject a rogue device and intercept the packets.

Palo Alto Networks says it is not aware of any of these vulnerabilities being exploited in attacks. Additional information can be found on the company’s security advisories page.

Related: Fortinet, Ivanti Patch High-Severity Vulnerabilities

Related: Chrome, Firefox Updates Resolve High-Severity Memory Bugs

Related: Exploited Vulnerability Impacts Over 80,000 Roundcube Servers

Related: Cisco Patches Critical ISE Vulnerability With Public PoC

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Learn how the LOtL threat landscape has evolved, why traditional endpoint hardening methods fall short, and how adaptive, user-aware approaches can reduce risk.

Watch Now

Join the summit to explore critical threats to public cloud infrastructure, APIs, and identity systems through discussions, case studies, and insights into emerging technologies like AI and LLMs.

Register

People on the Move

Coro, a provider of cybersecurity solutions for SMBs, has appointed Joe Sykora as CEO.

SonicWall has hired Rajnish Mishra as Senior Vice President and Chief Development Officer.

Kenna Security co-founder Ed Bellis has joined Empirical Security as Chief Executive Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.