

Description: Palo Alto Networks has issued a warning regarding active exploitation of a file read vulnerability, identified as CVE-2025-0111, in its PAN-OS firewalls. This flaw is being combined with two other vulnerabilities—CVE-2025-0108 and CVE-2024-9474—in attacks targeting unpatched systems.
The company initially disclosed the authentication bypass vulnerability CVE-2025-0108 on February 12, 2025, providing patches to address the issue. On the same day, researchers from Assetnote released a proof-of-concept exploit demonstrating how CVE-2025-0108 and CVE-2024-9474 could be chained to gain root privileges on vulnerable PAN-OS firewalls.
Subsequently, threat intelligence firm GreyNoise reported active exploitation attempts originating from multiple IP addresses. The CVE-2024-9474 vulnerability, a privilege escalation flaw in PAN-OS, was previously fixed in November 2024 after being exploited as a zero-day.
The newly highlighted CVE-2025-0111 flaw allows authenticated attackers with network access to the management web interface to read files accessible by the “nobody” user. Palo Alto Networks updated its security bulletin to emphasize that this vulnerability is now being exploited in conjunction with the other two flaws in active attacks.
Recommended Actions:
External Links:
Description: The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) has warned of a new ransomware called the “Ghost Ransomware” has been actively exploited by attackers in over 70 countries. The affected sectors include critical infrastructure, healthcare, government, education, technology, manufacturing, and numerous small and medium-sized businesses. The attackers exploit outdated software and firmware in internet-facing services, leading to widespread breaches. The Ghost ransomware group frequently changes their malware executables, file extensions of encrypted files, ransom note contents, and uses multiple email addresses for ransom communications, resulting in varied attributions over time.
Recommended Actions:
External Links:
Description: A massive brute force attack is currently underway, utilizing nearly 2.8 million unique IP addresses daily to target networking devices from manufacturers such as Palo Alto Networks, Ivanti, and SonicWall. The source IPs from the brute force attack primarily originate from Brazil, with others from Russia, Turkey, Argentina, Morocco, and Mexico. The brute force attacks are originating from MikroTik, Cisco, and Huawei routes, and are targeting VPNs, firewalls, gateways, and other publicly-facing security appliances.
Recommended Actions:
External Links: