[Palo Alto Networks Security Advisories] CVE-2025-4235 User-ID Credential Agent: Cleartext Exposure of Service Accountpassword

Palo Alto Networks Security Advisories /CVE-2025-4235

CVE-2025-4235 User-ID Credential Agent: Cleartext Exposure of Service Account password

UrgencyMODERATE

047910
Severity4.2 ·MEDIUM
Exploit MaturityUNREPORTED
Response EffortMODERATE
RecoveryUSER
Value DensityDIFFUSE
Attack ComplexityLOW
Attack RequirementsPRESENT
AutomatableNO
User InteractionNONE
Product ConfidentialityHIGH
Product IntegrityLOW
Product AvailabilityLOW
Privileges RequiredLOW
Subsequent ConfidentialityHIGH
Subsequent IntegrityHIGH
Subsequent AvailabilityHIGH

Description

An information exposure vulnerability in the Palo Alto Networks User-ID Credential Agent (Windows-based) can expose the service account password under specific non-default configurations. This allows an unprivileged Domain User to escalate privileges by exploiting the account’s permissions. The impact varies by configuration:

  • Minimally Privileged Accounts: Enable disruption of User-ID Credential Agent operations (e.g., uninstalling or disabling the agent service), weakening network security policies that leverage Credential Phishing Prevention under a Domain Credential Filter configuration.
  • Elevated Accounts (Server Operator, Domain Join, Legacy Features): Permit increased impacts, including server control (e.g., shutdown/restart), domain manipulation (e.g., rogue computer objects), and network compromise via reconnaissance or client probing. 

Product Status

VersionsAffectedUnaffected
User-ID Credential Agent 11.0.0>= 11.0.2-133 on Windows
< 11.0.3 on Windows
< 11.0.2-133 on Windows
>= 11.0.3 on Windows

Severity:MEDIUM, Suggested Urgency:MODERATE

Elevated Service Accounts
MEDIUM– CVSS-BT: 4.2 /CVSS-B: 7.2 (CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:L/VA:L/SC:H/SI:H/SA:H/E:U/AU:N/R:U/V:D/RE:M/U:Amber)

Minimally Privileged Service Account
LOW– CVSS-BT: 1.9 /CVSS-B: 5.8 (CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/AU:N/R:U/V:D/RE:M/U:Amber)

Exploitation Status

Palo Alto Networks is not aware of any malicious exploitation of this issue.

Weakness Type and Impact

CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere

CAPEC-37: Retrieve Embedded Sensitive Data

Solution

Version
Minor Version
Suggested Solution
User-ID Credential Agent 11.0 on Windows
11.0.2-133Upgrade to 11.0.3 or later
 11.0.0 through 11.0.1-104No action needed.

Workarounds and Mitigations

  • By default, Domain Users cannot log in to Domain Controllers. However, this can be changed through Group Policy. To reduce privilege escalation risks, review the “Allow log on locally” setting in the Default Domain Controllers Policy and remove any Domain Users listed there. Windows Server 2019 and 2022 path:
    • Group Policy Management > Domain Controllers > Select GPO (Edit) > Computer Configuration > Policies > Windows Settings > Security Settings > Local Policies > User Rights Assignment > “Allow log on locally”.
  • Refer to the “Create a Dedicated Service Account for the User-ID Agent” and “Configure Credential Detection with the Windows User-ID Agent” guidelines to ensure service accounts are configured with appropriate permissions and restrictions.

Acknowledgments

Palo Alto Networks thanks an external reporter for discovering and reporting this issue.

CPE Applicability

Timeline

Initial Publication


A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.