MACsec Protocol Vulnerability in Palo Alto Networks PAN-OSĀ® Affects PA-7500 Series Devices
CVE-2025-2182

5.6MEDIUM

Key Information:

Vendor
CVE Published:
13 August 2025

Badges

šŸ‘¾ Exploit Exists

What is CVE-2025-2182?

An implementation issue within the MACsec protocol in Palo Alto Networks PAN-OSĀ® leads to the inadvertent exposure of the connectivity association key (CAK). This vulnerability is specifically relevant to PA-7500 Series devices operating within an NGFW cluster. An attacker with access to this key could potentially intercept and decrypt messages exchanged between devices in the affected cluster. Importantly, devices that are not part of clustered configurations or are not utilizing MACsec are not affected by this vulnerability.

Affected Version(s)

PAN-OS PA-7500 11.2.0 < 11.2.8

PAN-OS PA-7500 11.1.0 < 11.1.10

Cloud NGFW All

References

CVSS V4

Score:
5.6
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
None
Attack Vector:
Physical
Attack Complexity:
Low
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • šŸ‘¾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

This issue was found during an internal security review.
.
CVE-2025-2182 : MACsec Protocol Vulnerability in Palo Alto Networks PAN-OSĀ® Affects PA-7500 Series Devices