{"vulnerability": "CVE-2025-0136", "sightings": [{"uuid": "e8c16483-eb62-499c-a693-eb305a6a8bf4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0136", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114517799027024663", "content": "", "creation_timestamp": "2025-05-16T13:42:20.278306Z"}, {"uuid": "6b667d00-dc4a-4aaf-8e67-ae6596d2aebe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0136", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114507227424079444", "content": "", "creation_timestamp": "2025-05-14T16:53:50.861688Z"}, {"uuid": "5ce6d4f4-3690-49cb-b582-bc38b7ca51e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0136", "type": "seen", "source": "https://security.paloaltonetworks.com/CVE-2025-0136", "content": "", "creation_timestamp": "2025-05-14T14:00:00.000000Z"}, {"uuid": "9ee95d26-9cee-4b5e-ac3d-1d903f5fe2d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0136", "type": "seen", "source": "https://bsky.app/profile/ripjyr.bsky.social/post/3lp5otyqatx2a", "content": "", "creation_timestamp": "2025-05-14T19:03:22.530165Z"}, {"uuid": "46b9273a-8dab-47b9-9657-949cb99aa88c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0136", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16359", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-0136\n\ud83d\udd25 CVSS Score: 5.3 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/AU:N/R:U/V:C/RE:M/U:Amber)\n\ud83d\udd39 Description: Using the AES-128-CCM algorithm for IPSec on certain Palo Alto Networks PAN-OS\u00ae firewalls (PA-7500, PA-5400, PA-5400f, PA-3400, PA-1600, PA-1400, and PA-400 Series) leads to unencrypted data transfer to devices that are connected to the PAN-OS firewall through IPSec.\n\nThis issue does not affect Cloud NGFWs, Prisma\u00ae Access instances, or  PAN-OS VM-Series firewalls.\n\nNOTE: The AES-128-CCM encryption algorithm is not recommended for use.\n\ud83d\udccf Published: 2025-05-14T18:12:14.153Z\n\ud83d\udccf Modified: 2025-05-14T18:12:14.153Z\n\ud83d\udd17 References:\n1. https://security.paloaltonetworks.com/CVE-2025-0136", "creation_timestamp": "2025-05-14T18:31:55.000000Z"}]}