[Palo Alto Networks Security Advisories] CVE-2025-2182 PAN-OS: Firewall Clusters using the MACsec Protocol Expose theConnectivity Association Key (CAK)

Palo Alto Networks Security Advisories /CVE-2025-2182

CVE-2025-2182 PAN-OS: Firewall Clusters using the MACsec Protocol Expose the Connectivity Association Key (CAK)

UrgencyMODERATE

047910
Severity3.3 ·LOW
Exploit MaturityUNREPORTED
Response EffortMODERATE
RecoveryAUTOMATIC
Value DensityDIFFUSE
Attack VectorADJACENT
Attack ComplexityLOW
Attack RequirementsPRESENT
AutomatableNO
User InteractionNONE
Product ConfidentialityHIGH
Product IntegrityNONE
Product AvailabilityNONE
Privileges RequiredHIGH
Subsequent ConfidentialityHIGH
Subsequent IntegrityNONE
Subsequent AvailabilityNONE

Description

A problem with the implementation of the MACsec protocol in Palo Alto Networks PAN-OS® results in the cleartext exposure of the connectivity association key (CAK). This issue is only applicable to PA-7500 Series devices which are in an NGFW cluster.
A user who possesses this key can read messages being sent between devices in a NGFW Cluster. There is no impact in non-clustered firewalls or clusters of firewalls that do not enable MACsec. 

Product Status

VersionsAffectedUnaffected
Cloud NGFWNoneAll
PAN-OSNone on devices other than PA-7500All on devices other than PA-7500
PAN-OS 11.2< 11.2.8 on PA-7500>= 11.2.8 on PA-7500
PAN-OS 11.1< 11.1.10 on PA-7500>= 11.1.10 on PA-7500
PAN-OS 10.2None on PA-7500All on PA-7500
PAN-OS 10.1None on PA-7500All on PA-7500
Prisma AccessNoneAll

Required Configuration for Exposure

The following conditions must be true to be vulnerable to this issue:

  1. Your PA-7500 Series devices must be in an NGFW cluster. For more information regarding NGFW Clusters see our documentation.

  2. A MACsec policy must be configured and enabled for the NGFW cluster. For more information about MACsec profiles please see our documentation.

Severity:LOW, Suggested Urgency:MODERATE

CVSS-BT:3.3 /CVSS-B:6.8 (CVSS:4.0/AV:A/AC:L/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:U/AU:N/R:A/V:D/RE:M/U:Amber)

Exploitation Status

Palo Alto Networks is not aware of any malicious exploitation of this issue.

Weakness Type and Impact

CWE-312 Cleartext Storage of Sensitive Information

CAPEC-158 Sniffing Network Traffic

Solution

Version
Minor Version
Suggested Solution
Cloud NGFW
No action needed.
PAN-OS 11.2 on PA-7500
11.2.0 through 11.2.7 Upgrade to 11.2.8 or later.
PAN-OS 11.1 on PA-7500
11.1.0 through 11.1.9 Upgrade to 11.1.10 or later.
PAN-OS 10.2 on PA-7500
No action needed.
PAN-OS 10.1 on PA-7500
No action needed.
PAN-OS on devices other than PA-7500
No action needed.
All older
unsupported
PAN-OS versions
 Upgrade to a supported fixed version.
Prisma Access
No action needed.

Workarounds and Mitigations

No known workarounds exist for this issue.

Acknowledgments

This issue was found during an internal security review.

CPEs

cpe:2.3:o:palo_alto_networks:pan-os:11.2.7:*:*:*:*:*:PA-7500:*

cpe:2.3:o:palo_alto_networks:pan-os:11.2.6:*:*:*:*:*:PA-7500:*

cpe:2.3:o:palo_alto_networks:pan-os:11.2.5:*:*:*:*:*:PA-7500:*

cpe:2.3:o:palo_alto_networks:pan-os:11.2.4:*:*:*:*:*:PA-7500:*

cpe:2.3:o:palo_alto_networks:pan-os:11.2.3:*:*:*:*:*:PA-7500:*

cpe:2.3:o:palo_alto_networks:pan-os:11.2.2:*:*:*:*:*:PA-7500:*

cpe:2.3:o:palo_alto_networks:pan-os:11.2.1:*:*:*:*:*:PA-7500:*

cpe:2.3:o:palo_alto_networks:pan-os:11.2.0:*:*:*:*:*:PA-7500:*

cpe:2.3:o:palo_alto_networks:pan-os:11.1.9:*:*:*:*:*:PA-7500:*

cpe:2.3:o:palo_alto_networks:pan-os:11.1.8:*:*:*:*:*:PA-7500:*

cpe:2.3:o:palo_alto_networks:pan-os:11.1.6:*:*:*:*:*:PA-7500:*

cpe:2.3:o:palo_alto_networks:pan-os:11.1.5:*:*:*:*:*:PA-7500:*

cpe:2.3:o:palo_alto_networks:pan-os:11.1.4:*:*:*:*:*:PA-7500:*

cpe:2.3:o:palo_alto_networks:pan-os:11.1.3:*:*:*:*:*:PA-7500:*

cpe:2.3:o:palo_alto_networks:pan-os:11.1.2:*:*:*:*:*:PA-7500:*

cpe:2.3:o:palo_alto_networks:pan-os:11.1.1:*:*:*:*:*:PA-7500:*

cpe:2.3:o:palo_alto_networks:pan-os:11.1.0:*:*:*:*:*:PA-7500:*

CPE Applicability

  • cpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:PA-7500:*:* is vulnerable from (including)11.2.0 and up to (excluding)11.2.8
  • ORcpe:2.3:o:palo_alto_networks:pan-os:*:*:*:*:*:PA-7500:*:* is vulnerable from (including)11.1.0 and up to (excluding)11.1.10

Timeline

Initial Publication


A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.