{"uuid": "3388ccb8-3ec0-4265-bbb8-dad5d72f5e7b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0125", "type": "seen", "source": "https://t.me/cvedetector/22698", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-0125 - Palo Alto Networks PAN-OS Impersonation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-0125 \nPublished : April 11, 2025, 2:15 a.m. | 49\u00a0minutes ago \nDescription : An improper input neutralization vulnerability in the management web interface of the Palo Alto Networks PAN-OS\u00ae software enables a malicious authenticated read-write administrator to impersonate another legitimate authenticated PAN-OS administrator.  \n  \n  \nThe attacker must have network access to the management web interface to exploit this issue. You greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended  critical deployment guidelines  .  \n  \nThis issue does not affect Cloud NGFW and all Prisma\u00ae Access instances. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-11T05:34:38.000000Z"}