Palo Alto Networks PAN-OS and Prisma Browser Vulnerabilities Disclosed
Palo Alto Networks disclosed a denial-of-service (DoS) vulnerability, identified as CVE-2025-4619, affecting PAN-OS software on PA-Series, VM-Series, CN-Series firewalls, and Prisma Access. This vulnerability allows an unauthenticated attacker to reboot a firewall by sending specially crafted packets through the data plane, potentially causing the device to enter maintenance mode if exploited repeatedly. The company has detailed affected and unaffected PAN-OS versions and confirmed that Cloud NGFW is not impacted. Prisma Access customers have largely been upgraded, with remaining updates scheduled.
Additionally, Palo Alto Networks released its November 2025 monthly vulnerability update for Chromium and Prisma Browser, addressing multiple CVEs, including several Chromium vulnerabilities and three specific to Prisma Browser (CVE-2025-4616, CVE-2025-4617, CVE-2025-4618). The Canadian Centre for Cyber Security issued an advisory summarizing these disclosures and urging administrators to review the advisories, apply mitigations, and update affected products to secure their environments against these vulnerabilities.
Timeline
Nov 12, 2025
Canadian Centre for Cyber Security republishes Palo Alto advisory notice
The Canadian Centre for Cyber Security published alert AV25-748 referencing a Palo Alto Networks security advisory. This reflects government-side dissemination of Palo Alto's November 12, 2025 security advisory information.
Nov 12, 2025
Palo Alto Networks issues November 2025 Chromium and Prisma Browser update
Palo Alto Networks released advisory PAN-SA-2025-0018 covering the November 2025 monthly vulnerability update for Chromium and Prisma Browser. The publication indicates security fixes or vulnerability information for those products were made available on November 12, 2025.
Nov 12, 2025
Palo Alto Networks discloses CVE-2025-4619 PAN-OS DoS vulnerability
Palo Alto Networks published a security advisory for CVE-2025-4619 describing a PAN-OS firewall denial-of-service condition triggered by specially crafted packets. The advisory publicly documented the vulnerability on November 12, 2025.
See the full picture in Mallory
Mallory subscribers get deeper analysis on every story, including:
Who’s affected and how
Deep-dive technical analysis
Actionable next steps for your team
IPs, domains, hashes, and more
Ask questions and take action on every story
Filter by topic, classification, timeframe
Get matching stories delivered automatically
Sources
Related Stories

Palo Alto PAN-OS Vulnerabilities Including ADNS DoS (CVE-2026-0229)
Palo Alto Networks published fixes for multiple **PAN-OS** vulnerabilities affecting supported releases (including PAN-OS 12.1, 11.2, 11.1, and 10.2) and related services such as *Prisma Access* and *Prisma Browser*. The Canadian Centre for Cyber Security amplified the vendor guidance, pointing organizations to apply updates and mitigations for PAN-OS and Prisma products, including **CVE-2026-0228** and **CVE-2026-0229**, and a separate Chromium monthly update advisory referenced by Palo Alto. **CVE-2026-0229** is a network-reachable denial-of-service condition in PAN-OS’s **Advanced DNS Security (ADNS)** feature that can allow an unauthenticated attacker to trigger system reboots with a maliciously crafted packet; repeated triggering can push a firewall into maintenance mode, creating a high availability impact. Exposure requires ADNS to be enabled and a spyware profile action set to `block`, `sinkhole`, or `alert` (i.e., not `allow`); Palo Alto stated *Cloud NGFW* and *Prisma Access* are not impacted by this specific issue and reported no known exploitation. **CVE-2026-0228** involves improper certificate validation that can allow Windows Terminal Server Agents to connect using expired certificates under certain configurations, with no workaround noted by the vendor; affected organizations are advised to upgrade to fixed PAN-OS versions per Palo Alto’s guidance.
1 months ago
Palo Alto Networks Patches Cortex XDR and Prisma Browser Vulnerabilities
**Palo Alto Networks** published security advisories addressing multiple vulnerabilities affecting *Cortex XDR* components and *Prisma Browser*, including **CVE-2026-0230** (macOS Cortex XDR Agent can be disabled by a local administrator) and **CVE-2026-0231** (Cortex XDR Broker VM information disclosure). For CVE-2026-0230, Palo Alto Networks reported a protection-mechanism issue on macOS that could allow malware to operate without detection if a local admin disables the agent; affected versions include *Cortex XDR Agent* **8.7-CE** prior to `8.7.101-CE` and **8.3-CE** prior to `8.3.102-CE` on macOS, with Palo Alto Networks stating it is not aware of in-the-wild exploitation. For CVE-2026-0231, an authenticated user with network access to the Broker VM could obtain and modify sensitive information by triggering a live terminal session via the Cortex UI and changing configuration settings; the issue affects *Cortex XDR Broker VM* **30.0.0** prior to `30.0.49`, and Palo Alto Networks stated there are no workarounds and that upgrading is required. Palo Alto Networks also released **PAN-SA-2026-0003**, incorporating upstream **Chromium** security fixes into *Prisma Browser* and listing multiple Chromium CVEs (including **CVE-2026-2314**, **CVE-2026-2321**, and **CVE-2026-2441**); *Prisma Browser* versions prior to `145.7.9.76` are affected and should be updated. The **Canadian Centre for Cyber Security** echoed these Palo Alto Networks advisories and urged organizations to apply the necessary updates and mitigations. A separate Canadian advisory covered **Splunk** product vulnerabilities across *Splunk Enterprise*, *Splunk Cloud Platform*, and multiple *AppDynamics* agents, but it is unrelated to the Palo Alto Networks Cortex/Prisma issues.
3 weeks ago
Denial-of-Service Vulnerabilities Disrupting Network Perimeter and Wi‑Fi Infrastructure
A **DoS vulnerability in Palo Alto Networks PAN-OS** tracked as **CVE-2024-3393** was reported as **actively exploited in the wild**, allowing **unauthenticated remote attackers** to send specially crafted **DNS** packets that can force affected firewalls to **reboot** and, with repeated triggering, potentially enter **maintenance mode**, effectively disabling perimeter enforcement. Reported impact is tied to the **data plane** when **DNS Security** is enabled and **DNS Security logging** is active, and it may affect multiple form factors (including PA-Series, VM-Series, CN-Series, and Prisma Access) where the DNS Security license is applied; advisories urge rapid patching/mitigation due to the risk of losing network security controls. Separately, researchers disclosed a **Broadcom chipset software flaw** affecting at least the **ASUS RT-BE86U** that enables an **unauthenticated, in-range attacker on 5 GHz Wi‑Fi** to send a single malformed frame that **immediately disconnects clients**, requiring a **manual router reset**; the issue was found via fuzzing, fixed by Broadcom, and addressed by ASUS in updated firmware (reported fixed in `3.0.0.6.102_37841`, affecting `3.0.0.6.102_37612` and older). A Palo Alto Networks advisory on a **Chromium monthly vulnerability update** lists multiple Chromium CVEs incorporated into Palo Alto products, but it is not directly related to the PAN-OS DNS DoS exploitation or the Broadcom/ASUS Wi‑Fi DoS issue.
1 months ago