<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Palo Alto Networks published seven new security advisories in Threats</title>
    <link>https://community.isc2.org/t5/Threats/Palo-Alto-Networks-published-seven-new-security-advisories/m-p/81338#M1672</link>
    <description>&lt;P&gt;Dear All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Palo Alto Networks published seven new security advisories at&lt;BR /&gt;&lt;A href="https://security.paloaltonetworks.com" target="_blank"&gt;https://security.paloaltonetworks.com&lt;/A&gt; on June 11, 2025:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Prisma Access Browser&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;PAN-SA-2025-0011 Chromium and Prisma Access Browser: Monthly Vulnerability Update (June 2025) (Severity: HIGH)&lt;BR /&gt;&lt;A href="https://security.paloaltonetworks.com/PAN-SA-2025-0011" target="_blank"&gt;https://security.paloaltonetworks.com/PAN-SA-2025-0011&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;GlobalProtect App&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;CVE-2025-4232 GlobalProtect: Authenticated Code Injection Through Wildcard on macOS (Severity: HIGH)&lt;BR /&gt;&lt;A href="https://security.paloaltonetworks.com/CVE-2025-4232" target="_blank"&gt;https://security.paloaltonetworks.com/CVE-2025-4232&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;CVE-2025-4227 GlobalProtect App: Interception in Endpoint Traffic Policy Enforcement (Severity: LOW)&lt;BR /&gt;&lt;A href="https://security.paloaltonetworks.com/CVE-2025-4227" target="_blank"&gt;https://security.paloaltonetworks.com/CVE-2025-4227&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;PAN-OS&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;CVE-2025-4230 PAN-OS: Authenticated Admin Command Injection Vulnerability Through CLI (Severity: MEDIUM)&lt;BR /&gt;&lt;A href="https://security.paloaltonetworks.com/CVE-2025-4230" target="_blank"&gt;https://security.paloaltonetworks.com/CVE-2025-4230&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;CVE-2025-4229 PAN-OS: Traffic Information Disclosure Vulnerability (Severity: LOW)&lt;BR /&gt;&lt;A href="https://security.paloaltonetworks.com/CVE-2025-4229" target="_blank"&gt;https://security.paloaltonetworks.com/CVE-2025-4229&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;CVE-2025-4231 PAN-OS: Authenticated Admin Command Injection Vulnerability in the Management Web Interface (Severity: MEDIUM)&lt;BR /&gt;&lt;A href="https://security.paloaltonetworks.com/CVE-2025-4231" target="_blank"&gt;https://security.paloaltonetworks.com/CVE-2025-4231&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;Cortex XDR Broker VM&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;CVE-2025-4228 Cortex XDR Broker VM: Privilege Escalation (PE) Vulnerability (Severity: LOW)&lt;BR /&gt;&lt;A href="https://security.paloaltonetworks.com/CVE-2025-4228" target="_blank"&gt;https://security.paloaltonetworks.com/CVE-2025-4228&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 11 Jun 2025 17:37:17 GMT</pubDate>
    <dc:creator>Kyaw_Myo_Oo</dc:creator>
    <dc:date>2025-06-11T17:37:17Z</dc:date>
    <item>
      <title>Palo Alto Networks published seven new security advisories</title>
      <link>https://community.isc2.org/t5/Threats/Palo-Alto-Networks-published-seven-new-security-advisories/m-p/81338#M1672</link>
      <description>&lt;P&gt;Dear All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Palo Alto Networks published seven new security advisories at&lt;BR /&gt;&lt;A href="https://security.paloaltonetworks.com" target="_blank"&gt;https://security.paloaltonetworks.com&lt;/A&gt; on June 11, 2025:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Prisma Access Browser&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;PAN-SA-2025-0011 Chromium and Prisma Access Browser: Monthly Vulnerability Update (June 2025) (Severity: HIGH)&lt;BR /&gt;&lt;A href="https://security.paloaltonetworks.com/PAN-SA-2025-0011" target="_blank"&gt;https://security.paloaltonetworks.com/PAN-SA-2025-0011&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;GlobalProtect App&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;CVE-2025-4232 GlobalProtect: Authenticated Code Injection Through Wildcard on macOS (Severity: HIGH)&lt;BR /&gt;&lt;A href="https://security.paloaltonetworks.com/CVE-2025-4232" target="_blank"&gt;https://security.paloaltonetworks.com/CVE-2025-4232&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;CVE-2025-4227 GlobalProtect App: Interception in Endpoint Traffic Policy Enforcement (Severity: LOW)&lt;BR /&gt;&lt;A href="https://security.paloaltonetworks.com/CVE-2025-4227" target="_blank"&gt;https://security.paloaltonetworks.com/CVE-2025-4227&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;PAN-OS&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;CVE-2025-4230 PAN-OS: Authenticated Admin Command Injection Vulnerability Through CLI (Severity: MEDIUM)&lt;BR /&gt;&lt;A href="https://security.paloaltonetworks.com/CVE-2025-4230" target="_blank"&gt;https://security.paloaltonetworks.com/CVE-2025-4230&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;CVE-2025-4229 PAN-OS: Traffic Information Disclosure Vulnerability (Severity: LOW)&lt;BR /&gt;&lt;A href="https://security.paloaltonetworks.com/CVE-2025-4229" target="_blank"&gt;https://security.paloaltonetworks.com/CVE-2025-4229&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;CVE-2025-4231 PAN-OS: Authenticated Admin Command Injection Vulnerability in the Management Web Interface (Severity: MEDIUM)&lt;BR /&gt;&lt;A href="https://security.paloaltonetworks.com/CVE-2025-4231" target="_blank"&gt;https://security.paloaltonetworks.com/CVE-2025-4231&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;Cortex XDR Broker VM&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;CVE-2025-4228 Cortex XDR Broker VM: Privilege Escalation (PE) Vulnerability (Severity: LOW)&lt;BR /&gt;&lt;A href="https://security.paloaltonetworks.com/CVE-2025-4228" target="_blank"&gt;https://security.paloaltonetworks.com/CVE-2025-4228&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Jun 2025 17:37:17 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Palo-Alto-Networks-published-seven-new-security-advisories/m-p/81338#M1672</guid>
      <dc:creator>Kyaw_Myo_Oo</dc:creator>
      <dc:date>2025-06-11T17:37:17Z</dc:date>
    </item>
  </channel>
</rss>

