{"uuid": "73ee504a-450e-4f84-9b91-8c8526386e1b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-4230", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18242", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-4230\n\ud83d\udd25 CVSS Score: 8.4 (cvssV4_0, Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/R:U/V:D/U:Amber)\n\ud83d\udd39 Description: A command injection vulnerability in Palo Alto Networks PAN-OS\u00ae software enables an authenticated administrator to bypass system restrictions and run arbitrary commands as a root user. To be able to exploit this issue, the user must have access to the PAN-OS CLI.\n\nThe security risk posed by this issue is significantly minimized when CLI access is restricted to a limited group of administrators. \n\nCloud NGFW and Prisma\u00ae Access are not affected by this vulnerability.\n\ud83d\udccf Published: 2025-06-12T23:30:15.781Z\n\ud83d\udccf Modified: 2025-06-12T23:30:15.781Z\n\ud83d\udd17 References:\n1. https://security.paloaltonetworks.com/CVE-2025-4230", "creation_timestamp": "2025-06-13T00:35:18.000000Z"}