<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Palo Alto Networks published 11 new security advisories in Threats</title>
    <link>https://community.isc2.org/t5/Threats/Palo-Alto-Networks-published-11-new-security-advisories/m-p/78662#M1578</link>
    <description>&lt;P&gt;Dear All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Palo Alto Networks published&lt;STRONG&gt; 11 new security advisories&amp;nbsp;&lt;/STRONG&gt;at &lt;A href="https://security.paloaltonetworks.com" target="_blank"&gt;https://security.paloaltonetworks.com&amp;nbsp;&lt;/A&gt;on April 9, 2025:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Prisma Access Browser&lt;/STRONG&gt;&lt;BR /&gt;PAN-SA-2025-0008 Chromium and Prisma Access Browser: Monthly Vulnerability Update (April 2025) (Severity: HIGH)&lt;BR /&gt;&lt;A href="https://security.paloaltonetworks.com/PAN-SA-2025-0008" target="_blank"&gt;https://security.paloaltonetworks.com/PAN-SA-2025-0008&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;PAN-OS&lt;/STRONG&gt;&lt;BR /&gt;CVE-2025-0128 PAN-OS: Firewall Denial of Service (DoS) Using a Specially Crafted Packet (Severity: MEDIUM)&lt;BR /&gt;&lt;A href="https://security.paloaltonetworks.com/CVE-2025-0128" target="_blank"&gt;https://security.paloaltonetworks.com/CVE-2025-0128&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;CVE-2025-0127 PAN-OS: Authenticated Admin Command Injection Vulnerability in PAN-OS VM-Series (Severity: MEDIUM)&lt;BR /&gt;&lt;A href="https://security.paloaltonetworks.com/CVE-2025-0127" target="_blank"&gt;https://security.paloaltonetworks.com/CVE-2025-0127&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;CVE-2025-0126 PAN-OS: Session Fixation Vulnerability in GlobalProtect SAML Login (Severity: MEDIUM)&lt;BR /&gt;&lt;A href="https://security.paloaltonetworks.com/CVE-2025-0126" target="_blank"&gt;https://security.paloaltonetworks.com/CVE-2025-0126&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;CVE-2025-0125 PAN-OS: Improper Neutralization of Input in the Management Web Interface (Severity: MEDIUM)&lt;BR /&gt;&lt;A href="https://security.paloaltonetworks.com/CVE-2025-0125" target="_blank"&gt;https://security.paloaltonetworks.com/CVE-2025-0125&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;CVE-2025-0124 PAN-OS: Authenticated File Deletion Vulnerability on the Management Web Interface (Severity: LOW)&lt;BR /&gt;&lt;A href="https://security.paloaltonetworks.com/CVE-2025-0124" target="_blank"&gt;https://security.paloaltonetworks.com/CVE-2025-0124&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;CVE-2025-0123 PAN-OS: Information Disclosure Vulnerability in HTTP/2 Packet Captures (Severity: LOW)&lt;BR /&gt;&lt;A href="https://security.paloaltonetworks.com/CVE-2025-0123" target="_blank"&gt;https://security.paloaltonetworks.com/CVE-2025-0123&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;Prisma SD-WAN&lt;/STRONG&gt;&lt;BR /&gt;CVE-2025-0122 Prisma SD-WAN: Denial of Service (DoS) Vulnerability Through Burst of Crafted Packets (Severity: MEDIUM)&lt;BR /&gt;&lt;A href="https://security.paloaltonetworks.com/CVE-2025-0122" target="_blank"&gt;https://security.paloaltonetworks.com/CVE-2025-0122&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;Cortex XDR Agent&lt;/STRONG&gt;&lt;BR /&gt;CVE-2025-0121 Cortex XDR Agent: Local Windows User Can Crash the Agent (Severity: MEDIUM)&lt;BR /&gt;&lt;A href="https://security.paloaltonetworks.com/CVE-2025-0121" target="_blank"&gt;https://security.paloaltonetworks.com/CVE-2025-0121&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;GlobalProtect App&lt;/STRONG&gt;&lt;BR /&gt;CVE-2025-0120 GlobalProtect App: Local Privilege Escalation (PE) Vulnerability (Severity: MEDIUM)&lt;BR /&gt;&lt;A href="https://security.paloaltonetworks.com/CVE-2025-0120" target="_blank"&gt;https://security.paloaltonetworks.com/CVE-2025-0120&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;Cortex XDR Broker VM&lt;/STRONG&gt;&lt;BR /&gt;CVE-2025-0119 Cortex XDR Broker VM: Authenticated Command Injection in Broker VM (Severity: LOW)&lt;BR /&gt;&lt;A href="https://security.paloaltonetworks.com/CVE-2025-0119" target="_blank"&gt;https://security.paloaltonetworks.com/CVE-2025-0119&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Be Aware Be Secure!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 09 Apr 2025 17:39:41 GMT</pubDate>
    <dc:creator>Kyaw_Myo_Oo</dc:creator>
    <dc:date>2025-04-09T17:39:41Z</dc:date>
    <item>
      <title>Palo Alto Networks published 11 new security advisories</title>
      <link>https://community.isc2.org/t5/Threats/Palo-Alto-Networks-published-11-new-security-advisories/m-p/78662#M1578</link>
      <description>&lt;P&gt;Dear All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Palo Alto Networks published&lt;STRONG&gt; 11 new security advisories&amp;nbsp;&lt;/STRONG&gt;at &lt;A href="https://security.paloaltonetworks.com" target="_blank"&gt;https://security.paloaltonetworks.com&amp;nbsp;&lt;/A&gt;on April 9, 2025:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Prisma Access Browser&lt;/STRONG&gt;&lt;BR /&gt;PAN-SA-2025-0008 Chromium and Prisma Access Browser: Monthly Vulnerability Update (April 2025) (Severity: HIGH)&lt;BR /&gt;&lt;A href="https://security.paloaltonetworks.com/PAN-SA-2025-0008" target="_blank"&gt;https://security.paloaltonetworks.com/PAN-SA-2025-0008&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;PAN-OS&lt;/STRONG&gt;&lt;BR /&gt;CVE-2025-0128 PAN-OS: Firewall Denial of Service (DoS) Using a Specially Crafted Packet (Severity: MEDIUM)&lt;BR /&gt;&lt;A href="https://security.paloaltonetworks.com/CVE-2025-0128" target="_blank"&gt;https://security.paloaltonetworks.com/CVE-2025-0128&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;CVE-2025-0127 PAN-OS: Authenticated Admin Command Injection Vulnerability in PAN-OS VM-Series (Severity: MEDIUM)&lt;BR /&gt;&lt;A href="https://security.paloaltonetworks.com/CVE-2025-0127" target="_blank"&gt;https://security.paloaltonetworks.com/CVE-2025-0127&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;CVE-2025-0126 PAN-OS: Session Fixation Vulnerability in GlobalProtect SAML Login (Severity: MEDIUM)&lt;BR /&gt;&lt;A href="https://security.paloaltonetworks.com/CVE-2025-0126" target="_blank"&gt;https://security.paloaltonetworks.com/CVE-2025-0126&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;CVE-2025-0125 PAN-OS: Improper Neutralization of Input in the Management Web Interface (Severity: MEDIUM)&lt;BR /&gt;&lt;A href="https://security.paloaltonetworks.com/CVE-2025-0125" target="_blank"&gt;https://security.paloaltonetworks.com/CVE-2025-0125&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;CVE-2025-0124 PAN-OS: Authenticated File Deletion Vulnerability on the Management Web Interface (Severity: LOW)&lt;BR /&gt;&lt;A href="https://security.paloaltonetworks.com/CVE-2025-0124" target="_blank"&gt;https://security.paloaltonetworks.com/CVE-2025-0124&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;CVE-2025-0123 PAN-OS: Information Disclosure Vulnerability in HTTP/2 Packet Captures (Severity: LOW)&lt;BR /&gt;&lt;A href="https://security.paloaltonetworks.com/CVE-2025-0123" target="_blank"&gt;https://security.paloaltonetworks.com/CVE-2025-0123&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;Prisma SD-WAN&lt;/STRONG&gt;&lt;BR /&gt;CVE-2025-0122 Prisma SD-WAN: Denial of Service (DoS) Vulnerability Through Burst of Crafted Packets (Severity: MEDIUM)&lt;BR /&gt;&lt;A href="https://security.paloaltonetworks.com/CVE-2025-0122" target="_blank"&gt;https://security.paloaltonetworks.com/CVE-2025-0122&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;Cortex XDR Agent&lt;/STRONG&gt;&lt;BR /&gt;CVE-2025-0121 Cortex XDR Agent: Local Windows User Can Crash the Agent (Severity: MEDIUM)&lt;BR /&gt;&lt;A href="https://security.paloaltonetworks.com/CVE-2025-0121" target="_blank"&gt;https://security.paloaltonetworks.com/CVE-2025-0121&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;GlobalProtect App&lt;/STRONG&gt;&lt;BR /&gt;CVE-2025-0120 GlobalProtect App: Local Privilege Escalation (PE) Vulnerability (Severity: MEDIUM)&lt;BR /&gt;&lt;A href="https://security.paloaltonetworks.com/CVE-2025-0120" target="_blank"&gt;https://security.paloaltonetworks.com/CVE-2025-0120&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;Cortex XDR Broker VM&lt;/STRONG&gt;&lt;BR /&gt;CVE-2025-0119 Cortex XDR Broker VM: Authenticated Command Injection in Broker VM (Severity: LOW)&lt;BR /&gt;&lt;A href="https://security.paloaltonetworks.com/CVE-2025-0119" target="_blank"&gt;https://security.paloaltonetworks.com/CVE-2025-0119&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Be Aware Be Secure!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Apr 2025 17:39:41 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Palo-Alto-Networks-published-11-new-security-advisories/m-p/78662#M1578</guid>
      <dc:creator>Kyaw_Myo_Oo</dc:creator>
      <dc:date>2025-04-09T17:39:41Z</dc:date>
    </item>
  </channel>
</rss>

