Palo Alto has released a security advisory for two high-severity vulnerabilities in its PAN-OS software.
CVE-2025-0108 is an authentication bypass flaw with a CVSSv4 score of up to 7.8 when the management interface is exposed to external IPs. It allows an unauthenticated attacker with network access to bypass authentication and invoke certain PHP scripts, potentially compromising the integrity and confidentiality of PAN-OS.
CVE-2025-0111 is an authenticated file read vulnerability with a CVSSv4 score of up to 7.1. An attacker with network access and valid credentials can read files accessible to the 'nobody' user, potentially exposing sensitive data for further exploitation.
SimpleHelp has released security updates to fix one critical and two high-severity vulnerabilities in its remote monitoring and management (RMM) software. Exploiting these flaws could allow an unauthenticated attacker to execute arbitrary code, access server configuration files, and escalate privileges.
The vulnerabilities include CVE-2024-57726 (missing authorisation, CVSS 9.9), CVE-2024-57727 (path traversal, CVSS 7.5), and CVE-2024-57728 (path traversal, CVSS 7.2).
PostgreSQL: The PostgreSQL Global Development Group (Postgres) has issued an advisory regarding a high-severity vulnerability in PostgreSQL, a relational SQL database management system. Identified as CVE-2025-1094, this 'improper neutralisation of quoting syntax' flaw has a CVSSv3 score of 8.1. A remote unauthenticated attacker could exploit it to perform SQL injection by sending a specially crafted SQL statement. This could then be used to execute arbitrary code through the psql tool. Proof-of-concept code for CVE-2025-1094 has been publicly released.
Juniper has issued an unscheduled security update to address a critical vulnerability in API authentication. This flaw, which involves an alternate path or channel, has been assigned a CVSSv4 score of 9.3. If exploited, it could enable a remote attacker to bypass authentication and gain administrative control over the device.
Citrix has released security updates to address a high-severity privilege escalation vulnerability in NetScaler Console (formerly NetScaler ADM) and NetScaler Agent. The flaw, identified as CVE-2024-12284 with a CVSS v4 score of 8.8, stems from improper privilege management. Authenticated users with existing access could exploit this vulnerability to execute commands without additional authorisation. Affected versions include NetScaler Console 14.1 before 14.1-38.53 and 13.1 before 13.1-56.18, as well as NetScaler Agent 14.1 before 14.1-38.53 and 13.1 before 13.1-56.18. Citrix strongly recommends that customers update to the latest versions promptly, as no workarounds are available. Users of the Citrix-managed NetScaler Console Service are not affected and need not take action.
Recommended Action
Organisations are encouraged to review the appropriate security advisory pages and apply the updates:
Palo Alto – Security Advisories CVE-2025-0108 and CVE-2025-0111
SimpleHelp – Security Vulnerabilities
PostgreSQL – Security
Juniper – Knowledge Base
Citrix – Security Bulletin
If you have any concerns, or have been affected by a cyber-related issue, report it to us by submitting a Cyber Concerns Online Reporting Form.