<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Palo Alto Networks published 11 new security advisories in Threats</title>
    <link>https://community.isc2.org/t5/Threats/Palo-Alto-Networks-published-11-new-security-advisories/m-p/80334#M1659</link>
    <description>&lt;P&gt;Dear All,&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Palo Alto Networks published 11 new security advisories on May 14, 2025:&lt;BR /&gt;&lt;A href="https://security.paloaltonetworks.com" target="_blank" rel="noopener"&gt;https://security.paloaltonetworks.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;Prisma Access Browser&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;PAN-SA-2025-0009 Chromium: Monthly Vulnerability Update (May 2025) (Severity: HIGH)&lt;BR /&gt;&lt;A href="https://security.paloaltonetworks.com/PAN-SA-2025-0009" target="_blank" rel="noopener"&gt;https://security.paloaltonetworks.com/PAN-SA-2025-0009&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;PAN-OS&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;CVE-2025-0133 PAN-OS: Reflected Cross-Site Scripting (XSS) Vulnerability in GlobalProtect Gateway and Portal (Severity: MEDIUM)&lt;BR /&gt;&lt;A href="https://security.paloaltonetworks.com/CVE-2025-0133" target="_blank" rel="noopener"&gt;https://security.paloaltonetworks.com/CVE-2025-0133&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;CVE-2025-0130 PAN-OS: Firewall Denial-of-Service (DoS) in the Web-Proxy Feature via a Burst of Maliciously Crafted Packets (Severity: MEDIUM)&lt;BR /&gt;&lt;A href="https://security.paloaltonetworks.com/CVE-2025-0130" target="_blank" rel="noopener"&gt;https://security.paloaltonetworks.com/CVE-2025-0130&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;CVE-2025-0137 PAN-OS: Improper Neutralization of Input in the Management Web Interface (Severity: LOW)&lt;BR /&gt;&lt;A href="https://security.paloaltonetworks.com/CVE-2025-0137" target="_blank" rel="noopener"&gt;https://security.paloaltonetworks.com/CVE-2025-0137&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;CVE-2025-0136 PAN-OS: Unencrypted Data Transfer when using AES-128-CCM on Intel-based hardware devices (Severity: LOW)&lt;BR /&gt;&lt;A href="https://security.paloaltonetworks.com/CVE-2025-0136" target="_blank" rel="noopener"&gt;https://security.paloaltonetworks.com/CVE-2025-0136&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;PAN-SA-2025-0010 Informational Bulletin: No Impact of the Marvin Attack on PAN-OS (Severity: NONE)&lt;BR /&gt;&lt;A href="https://security.paloaltonetworks.com/PAN-SA-2025-0010" target="_blank" rel="noopener"&gt;https://security.paloaltonetworks.com/PAN-SA-2025-0010&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;Cortex XDR Broker VM&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;CVE-2025-0132 Cortex XDR Broker VM: Unauthenticated User Can Disable Internal Services (Severity: LOW)&lt;BR /&gt;&lt;A href="https://security.paloaltonetworks.com/CVE-2025-0132" target="_blank" rel="noopener"&gt;https://security.paloaltonetworks.com/CVE-2025-0132&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;CVE-2025-0134 Cortex XDR Broker VM: Authenticated Code Injection Vulnerability in Broker VM (Severity: LOW)&lt;BR /&gt;&lt;A href="https://security.paloaltonetworks.com/CVE-2025-0134" target="_blank" rel="noopener"&gt;https://security.paloaltonetworks.com/CVE-2025-0134&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;GlobalProtect App&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;CVE-2025-0131 GlobalProtect App: Incorrect Privilege Management Vulnerability in OPSWAT MetaDefender Endpoint Security SDK (Severity: MEDIUM)&lt;BR /&gt;&lt;A href="https://security.paloaltonetworks.com/CVE-2025-0131" target="_blank" rel="noopener"&gt;https://security.paloaltonetworks.com/CVE-2025-0131&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;CVE-2025-0135 GlobalProtect App on macOS: Non Admin User Can Disable the GlobalProtect App (Severity: LOW)&lt;BR /&gt;&lt;A href="https://security.paloaltonetworks.com/CVE-2025-0135" target="_blank" rel="noopener"&gt;https://security.paloaltonetworks.com/CVE-2025-0135&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;Prisma Cloud Compute Edition&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;CVE-2025-0138 Prisma Cloud Compute Edition: Insufficient Session Expiration Vulnerability in the Web Interface (Severity: LOW)&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://security.paloaltonetworks.com/CVE-2025-0138" target="_blank" rel="noopener"&gt;https://security.paloaltonetworks.com/CVE-2025-0138&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 14 May 2025 19:07:05 GMT</pubDate>
    <dc:creator>Kyaw_Myo_Oo</dc:creator>
    <dc:date>2025-05-14T19:07:05Z</dc:date>
    <item>
      <title>Palo Alto Networks published 11 new security advisories</title>
      <link>https://community.isc2.org/t5/Threats/Palo-Alto-Networks-published-11-new-security-advisories/m-p/80334#M1659</link>
      <description>&lt;P&gt;Dear All,&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Palo Alto Networks published 11 new security advisories on May 14, 2025:&lt;BR /&gt;&lt;A href="https://security.paloaltonetworks.com" target="_blank" rel="noopener"&gt;https://security.paloaltonetworks.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;Prisma Access Browser&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;PAN-SA-2025-0009 Chromium: Monthly Vulnerability Update (May 2025) (Severity: HIGH)&lt;BR /&gt;&lt;A href="https://security.paloaltonetworks.com/PAN-SA-2025-0009" target="_blank" rel="noopener"&gt;https://security.paloaltonetworks.com/PAN-SA-2025-0009&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;PAN-OS&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;CVE-2025-0133 PAN-OS: Reflected Cross-Site Scripting (XSS) Vulnerability in GlobalProtect Gateway and Portal (Severity: MEDIUM)&lt;BR /&gt;&lt;A href="https://security.paloaltonetworks.com/CVE-2025-0133" target="_blank" rel="noopener"&gt;https://security.paloaltonetworks.com/CVE-2025-0133&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;CVE-2025-0130 PAN-OS: Firewall Denial-of-Service (DoS) in the Web-Proxy Feature via a Burst of Maliciously Crafted Packets (Severity: MEDIUM)&lt;BR /&gt;&lt;A href="https://security.paloaltonetworks.com/CVE-2025-0130" target="_blank" rel="noopener"&gt;https://security.paloaltonetworks.com/CVE-2025-0130&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;CVE-2025-0137 PAN-OS: Improper Neutralization of Input in the Management Web Interface (Severity: LOW)&lt;BR /&gt;&lt;A href="https://security.paloaltonetworks.com/CVE-2025-0137" target="_blank" rel="noopener"&gt;https://security.paloaltonetworks.com/CVE-2025-0137&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;CVE-2025-0136 PAN-OS: Unencrypted Data Transfer when using AES-128-CCM on Intel-based hardware devices (Severity: LOW)&lt;BR /&gt;&lt;A href="https://security.paloaltonetworks.com/CVE-2025-0136" target="_blank" rel="noopener"&gt;https://security.paloaltonetworks.com/CVE-2025-0136&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;PAN-SA-2025-0010 Informational Bulletin: No Impact of the Marvin Attack on PAN-OS (Severity: NONE)&lt;BR /&gt;&lt;A href="https://security.paloaltonetworks.com/PAN-SA-2025-0010" target="_blank" rel="noopener"&gt;https://security.paloaltonetworks.com/PAN-SA-2025-0010&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;Cortex XDR Broker VM&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;CVE-2025-0132 Cortex XDR Broker VM: Unauthenticated User Can Disable Internal Services (Severity: LOW)&lt;BR /&gt;&lt;A href="https://security.paloaltonetworks.com/CVE-2025-0132" target="_blank" rel="noopener"&gt;https://security.paloaltonetworks.com/CVE-2025-0132&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;CVE-2025-0134 Cortex XDR Broker VM: Authenticated Code Injection Vulnerability in Broker VM (Severity: LOW)&lt;BR /&gt;&lt;A href="https://security.paloaltonetworks.com/CVE-2025-0134" target="_blank" rel="noopener"&gt;https://security.paloaltonetworks.com/CVE-2025-0134&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;GlobalProtect App&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;CVE-2025-0131 GlobalProtect App: Incorrect Privilege Management Vulnerability in OPSWAT MetaDefender Endpoint Security SDK (Severity: MEDIUM)&lt;BR /&gt;&lt;A href="https://security.paloaltonetworks.com/CVE-2025-0131" target="_blank" rel="noopener"&gt;https://security.paloaltonetworks.com/CVE-2025-0131&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;CVE-2025-0135 GlobalProtect App on macOS: Non Admin User Can Disable the GlobalProtect App (Severity: LOW)&lt;BR /&gt;&lt;A href="https://security.paloaltonetworks.com/CVE-2025-0135" target="_blank" rel="noopener"&gt;https://security.paloaltonetworks.com/CVE-2025-0135&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;Prisma Cloud Compute Edition&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;CVE-2025-0138 Prisma Cloud Compute Edition: Insufficient Session Expiration Vulnerability in the Web Interface (Severity: LOW)&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://security.paloaltonetworks.com/CVE-2025-0138" target="_blank" rel="noopener"&gt;https://security.paloaltonetworks.com/CVE-2025-0138&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 14 May 2025 19:07:05 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Palo-Alto-Networks-published-11-new-security-advisories/m-p/80334#M1659</guid>
      <dc:creator>Kyaw_Myo_Oo</dc:creator>
      <dc:date>2025-05-14T19:07:05Z</dc:date>
    </item>
  </channel>
</rss>

