A denial-of-service (DoS) vulnerability in Palo Alto Networks PAN-OS software enables an unauthenticated attacker to reboot a firewall by sending a specially crafted packet through the dataplane. Repeated attempts to initiate a reboot causes the firewall to enter maintenance mode. This issue is applicable to the PAN-OS software versions listed below on PA-Series firewalls, VM-Series firewalls, and Prisma® Access software. This issue does not affect Cloud NGFW. We have successfully completed the Prisma Access upgrade for all customers, with the exception of those facing issues such as conflicting maintenance windows. Remaining customers will be promptly scheduled for an upgrade through our standard upgrade process.
| Version | Base score | Base severity | Vector |
|---|---|---|---|
| 4.0 | 6.6 | MEDIUM | CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/AU:Y/R:U/V:C/RE:M/U:Amber |
Version Minor Version Suggested Solution Cloud NGFW No action needed.PAN-OS 12.1 No action needed. PAN-OS 11.2 11.2.0 through 11.2.4 Upgrade to 11.2.4-h4 or 11.2.5 or later. 11.2.0 through 11.2.3 Upgrade to 11.2.3-h6 or 11.2.5 or later. 11.2.0 through 11.2.2 Upgrade to 11.2.2-h2 or 11.2.5 or later. PAN-OS 11.1 11.1.0 through 11.1.6 Upgrade to 11.1.6-h1 or 11.1.7 or later. 11.1.0 through 11.1.4 Upgrade to 11.1.4-h13 or 11.1.7 or later. 11.1.0 through 11.1.3 Remain on a version older than 11.1.3-h2 or upgrade to 11.1.4-h13 or 11.1.7 or later. 11.1.0 through 11.1.2 Upgrade to 11.1.2-h18 or 11.1.7 or later. PAN-OS 10.2 10.2.0 through 10.2.13 Upgrade to 10.2.13-h3 or 10.2.14 or later. 10.2.0 through 10.2.12 Upgrade to 10.2.12-h6 or 10.2.14 or later. 10.2.0 through 10.2.11 Upgrade to 10.2.11-h12 or 10.2.14 or later. 10.2.0 through 10.2.10 Upgrade to 10.2.10-h14 or 10.2.14 or later. 10.2.0 through 10.2.9 Upgrade to 10.2.9-h21 or 10.2.14 or later. 10.2.0 through 10.2.8 Upgrade to 10.2.8-h21 or 10.2.14 or later. 10.2.0 through 10.2.7 Upgrade to 10.2.7-h24 or 10.2.14 or later. 10.2.0 through 10.2.4 Remain on a version older than 10.2.4-h25 PAN-OS 10.1 No action needed.All older unsupported PAN-OS versions Upgrade to a supported fixed version. Prisma Access on PAN-OS11.2.0 through 11.2.4Upgrade to 11.2.4-h4 or later 10.2.0 through 10.2.10 Upgrade to 10.2.10-h14 or 11.2.4-h4 or later. 10.2.0 through 10.2.4 Remain on a version older than 10.2.4-h25.
This issue is only applicable to firewalls where URL proxy or any decrypt-policy is configured. When any decrypt policy is configured, this issue may be encountered regardless of whether traffic matches explicit decrypt, explicit no-decrypt, or none of the decryption policies.
No known workarounds exist for this issue.
Palo Alto Networks is not aware of any malicious exploitation of this issue.
| Event | Date |
|---|---|
| Initial publication | 2025-11-12 17:00:00 |
| Hyperlink | Resource |
|---|---|
| https://security.paloaltonetworks.com/CVE-2025-4619 | vendor-advisory |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|