CybersecurityNewswireTechnology

Palo Alto Networks Fixes Critical Security Vulnerabilities

▼ Summary

– Palo Alto Networks released patches on June 11 for vulnerabilities in products like GlobalProtect App, Cortex XDR, PAN-OS, and Prisma Access Browser.
– Six vulnerabilities were identified, ranging from low to high severity, with CVSS scores between 0.3 and 7.1.
– The most critical flaw (CVE-2025-4232) is a high-severity code injection issue in GlobalProtect App on macOS, requiring moderate urgency to patch.
– Two medium-severity flaws (CVE-2025-4230 and CVE-2025-4231) affect PAN-OS, involving admin command injection vulnerabilities.
– Palo Alto also fixed 12 high-severity flaws (CVSS 8.6) in Prisma Access Browser, including 11 Chrome-related issues and a cache implementation flaw (CVE-2025-4233).

Palo Alto Networks has rolled out critical security updates addressing multiple vulnerabilities across its product lineup, including GlobalProtect App, Cortex XDR, PAN-OS, and Prisma Access Browser. These patches target flaws ranging from low to high severity, with the most pressing issue posing a significant risk to macOS users.

The standout vulnerability, CVE-2025-4232, carries a CVSS score of 7.1 and impacts GlobalProtect App versions 6.0 through 6.3 on macOS. This high-severity flaw allows authenticated code injection, prompting Palo Alto to recommend immediate patching. While exploitation hasn’t been observed, the potential for abuse makes this update a priority for administrators.

Two additional medium-severity vulnerabilities affect PAN-OS versions 10.1 to 11.2. Tracked as CVE-2025-4230 (CVSS 5.7) and CVE-2025-4231 (CVSS 6.1), these flaws involve authenticated admin command injection risks. Though less severe than the macOS issue, they still warrant prompt attention to prevent potential system compromises.

Beyond its proprietary software, Palo Alto addressed 12 Chrome-related vulnerabilities impacting its Prisma Access Browser, which relies on Chromium’s open-source foundation. The most serious of these, CVE-2025-4233, involves cache implementation weaknesses and carries an 8.6 CVSS score. Alongside this critical fix, 11 other browser-related patches were released to shore up security.

While no active exploits have been reported, the breadth of affected systems, spanning endpoint protection, network security, and cloud-based browsing solutions, makes these updates essential for maintaining enterprise security postures. Organizations using Palo Alto products should prioritize applying these patches, particularly for macOS deployments and browser implementations.

(Source: InfoSecurity Magazine)

Topics

palo alto networks security patches 95% globalprotect app vulnerability 90% pan-os vulnerabilities 85% prisma access browser flaws 80% macos security risk 75% cvss scores 70% enterprise security updates 65%
Show More

The Wiz

Wiz Consults, home of the Internet is led by "the twins", Wajdi & Karim, experienced professionals who are passionate about helping businesses succeed in the digital world. With over 20 years of experience in the industry, they specialize in digital publishing and marketing, and have a proven track record of delivering results for their clients.