Generated remediation guidance and an executive summary. No account required.
A missing exception check in Palo Alto Networks PAN-OS® software with the web proxy feature enabled allows an unauthenticated attacker to send a burst of maliciously crafted packets that causes the firewall to become unresponsive and eventually reboot. Repeated successful attempts to trigger this condition will cause the firewall to enter maintenance mode. This issue does not affect Cloud NGFW or Prisma Access.
Use CWE-754, Paloaltonetworks vendor hub and Pan-Os product page to widen CVE-2025-0130 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2024-0012, CVE-2025-0108 and CVE-2024-3393 for nearby disclosures in the same product family.