
Google’s Project Zero and Mandiant cybersecurity teams have jointly released a proof-of-concept (PoC) exploit for a significant security vulnerability identified in Palo Alto Networks’ PAN-OS OpenConfig plugin. This vulnerability, tracked as CVE-2025-0110, allows authenticated administrators to execute arbitrary commands on firewalls via manipulated gNMI requests, potentially escalating their privileges to root access.
Vulnerability Details
Nature of CVE-2025-0110
- Description: CVE-2025-0110 is a command injection vulnerability located in the PAN-OS OpenConfig plugin, a component designed to facilitate the management and configuration of network devices using the gNMI (gRPC Network Management Interface) protocol. The flaw allows attackers to inject malicious commands into the type parameter of an XPATH query when retrieving syslogs.
- Severity: The vulnerability has been assigned a CVSS score of 8.6, indicating its high severity. This score reflects the potential for significant impact, given that successful exploitation can lead to unauthorized command execution and potential compromise of the affected systems.
Exploitation
Attack Vector
- Authenticated Access Requirement: To exploit this vulnerability, attackers must have authenticated access to the PAN-OS device. This means that they need valid administrator credentials to initiate the attack. Once authenticated, they can exploit the vulnerability by injecting arbitrary bash commands into the gNMI requests.
- PoC Example: The released PoC demonstrates how to embed malicious commands into the query. For example, the following command demonstrates injecting a command to write “system” into a file named file1:
./gnmic -a <IP>:9339 -u admin --password=<PASSWORD> --skip-verify \ --path 'pan-logging:/pan/logging/query/custom[type=$(echo system > file1; cat file1)]'
This command utilizes the gNMI client (gnmic) to send a request that includes the injected command within the type parameter. When processed by the vulnerable PAN-OS device, the injected command is executed with elevated privileges.
Impact and Risks
Unauthorized Command Execution
- Privilege Escalation: Successfully exploiting this vulnerability allows attackers to execute arbitrary commands with elevated privileges. This can lead to a complete compromise of the affected system, as the attacker can gain root access and control over the device.
- System Compromise: With root access, attackers can manipulate the system configurations, exfiltrate sensitive data, install additional malware, and disrupt network operations.
Mitigation Measures
Immediate Actions
- Apply Security Updates: Palo Alto Networks has released fixed versions of the OpenConfig plugin that address this vulnerability. These updates were made available on February 12, 2025. Affected users are strongly urged to apply these patches immediately to mitigate the risk. The fixed versions include PAN-OS 11.2.4-h4, 11.1.6-h1, and later releases.
- Restrict Management Interface Access: To reduce the attack surface, limit access to the management interface of PAN-OS devices. Ensure that only trusted IP addresses can access the management interface, thereby minimizing the risk of unauthorized access.
Long-Term Strategies
- Disable OpenConfig: If the OpenConfig plugin is not required for your network operations, consider disabling or uninstalling it. This will eliminate the potential risk associated with this component.
- Regular Security Audits: Conduct regular security audits and vulnerability assessments to identify and address potential weaknesses in your IT infrastructure. This proactive approach helps in early detection and remediation of vulnerabilities.
- Enhanced Access Controls: Implement robust access control mechanisms to ensure that only authorized users can perform administrative actions. Enforce multi-factor authentication (MFA) for all administrative accounts to add an extra layer of security.
- Monitoring and Logging: Deploy comprehensive monitoring and logging solutions to detect and respond to unauthorized access attempts. Regularly review logs for signs of suspicious activity to promptly identify and mitigate potential threats.
- User Education and Awareness: Educate administrators and users about the risks associated with command injection vulnerabilities and the importance of following security best practices. Encourage them to report any suspicious activities promptly.
Final Thoughts
The release of the PoC for CVE-2025-0110 underscores the critical importance of timely security updates and robust access controls. By understanding the nature of the vulnerability and its potential impact, and by implementing the recommended mitigation measures, organizations can better protect their systems from potential exploitation.


