{"uuid": "266a3534-b452-4aaf-a4ae-ce817543b3d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0124", "type": "seen", "source": "https://t.me/cvedetector/22697", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-0124 - Palo Alto Networks PAN-OS File Deletion Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-0124 \nPublished : April 11, 2025, 2:15 a.m. | 49\u00a0minutes ago \nDescription : An authenticated file deletion vulnerability in the Palo Alto Networks PAN-OS\u00ae software enables an authenticated attacker with network access to the management web interface to delete certain files as the \u201cnobody\u201d user; this includes limited logs and configuration files but does not include system files.  \n  \nThe attacker must have network access to the management web interface to exploit this issue. You greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended  critical deployment guidelines  .  \n  \nThis issue affects Cloud NGFW. However, this issue does not affect Prisma\u00ae Access software. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-11T05:34:37.000000Z"}