CVE-2025-0116

PAN-OS: Firewall Denial of Service (DoS) Using a Specially Crafted LLDP Frame

Description

A Denial of Service (DoS) vulnerability in Palo Alto Networks PAN-OS software causes the firewall to unexpectedly reboot when processing a specially crafted LLDP frame sent by an unauthenticated adjacent attacker. Repeated attempts to initiate this condition causes the firewall to enter maintenance mode. This issue does not apply to Cloud NGFWs or Prisma Access software.

Remediation

Solution:

  • Version Minor Version Suggested Solution PAN-OS 11.2 11.2.0 through 11.2.4 Upgrade to 11.2.5 or later PAN-OS 11.111.1.0 through 11.1.7 Upgrade to 11.1.8 or later PAN-OS 11.0 (EoL) Upgrade to a supported fixed versionPAN-OS 10.210.2.13Upgrade to 10.2.13-h5 or 10.2.14 or later  10.2.0 through 10.2.13 Upgrade to 10.2.14 or later PAN-OS 10.1 10.1.0 through 10.1.14Upgrade to 10.1.14-h11 or laterAll other older unsupported PAN-OS versions Upgrade to a supported fixed version.

Workaround:

  • Option 1: If you are not using LLDP, you should disable it to mitigate this issue by performing the following steps in your web interface: * Select Network > LLDP. * Open LLDP General settings. * Disable (uncheck) LLDP. Option 2: You can disable LLDP for your network interfaces by performing the following steps in your web interface: * Select Network > Interfaces and select the interface you wish to disable LLDP for. * Select Advanced > LLDP. * Disable (uncheck) LLDP.  Option 3: If you are using LLDP only to advertise information about your PAN-OS device to other neighboring devices, you should set the LLDP mode to transmit-only for the profile used on your network interfaces by performing the following steps in your web interface: * Select Network > Network Profiles > LLDP Profile * Select the profile used with the interface * Set the "Mode" to "transmit-only".

Category

6.8
CVSS
Severity: Medium
CVSS 4.0 •
EPSS 0.02%
Vendor Advisory paloaltonetworks.com
Affected: Palo Alto Networks PAN-OS
Affected: Palo Alto Networks Cloud NGFW
Affected: Palo Alto Networks Prisma Access
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2025-0116?
CVE-2025-0116 has been scored as a medium severity vulnerability.
How to fix CVE-2025-0116?
To fix CVE-2025-0116: Version Minor Version Suggested Solution PAN-OS 11.2 11.2.0 through 11.2.4 Upgrade to 11.2.5 or later PAN-OS 11.111.1.0 through 11.1.7 Upgrade to 11.1.8 or later PAN-OS 11.0 (EoL) Upgrade to a supported fixed versionPAN-OS 10.210.2.13Upgrade to 10.2.13-h5 or 10.2.14 or later  10.2.0 through 10.2.13 Upgrade to 10.2.14 or later PAN-OS 10.1 10.1.0 through 10.1.14Upgrade to 10.1.14-h11 or laterAll other older unsupported PAN-OS versions Upgrade to a supported fixed version.
Is CVE-2025-0116 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2025-0116 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2025-0116?
CVE-2025-0116 affects Palo Alto Networks PAN-OS, Palo Alto Networks Cloud NGFW, Palo Alto Networks Prisma Access.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.