Palo Alto Networks Security Advisories / PAN-SA-2025-0011

PAN-SA-2025-0011 Chromium and Prisma Access Browser: Monthly Vulnerability Update (June 2025)

Urgency MODERATE

047910
Severity 8.6 · HIGH
Exploit Maturity ATTACKED
Response Effort MODERATE
Recovery USER
Value Density DIFFUSE
Attack Vector NETWORK
Attack Complexity LOW
Attack Requirements NONE
Automatable NO
User Interaction ACTIVE
Product Confidentiality HIGH
Product Integrity HIGH
Product Availability HIGH
Privileges Required NONE
Subsequent Confidentiality NONE
Subsequent Integrity NONE
Subsequent Availability NONE

Description

Palo Alto Networks incorporated the following Chromium security fixes into our products:

Additionally, a vulnerability in Prisma Access Browser was also addressed.

CVESummary
CVE-2025-4664Insufficient policy enforcement in Loader
CVE-2025-5063Use after free in Compositing
CVE-2025-5064Inappropriate implementation in Background Fetch API
CVE-2025-5065Inappropriate implementation in FileSystemAccess API
CVE-2025-5066Inappropriate implementation in Messages
CVE-2025-5067Inappropriate implementation in Tab Strip
CVE-2025-5068Use after free in Blink
CVE-2025-5280Out of bounds write in V8
CVE-2025-5281Inappropriate implementation in BFCache
CVE-2025-5283Use after free in libvpx
CVE-2025-5419Out of bounds read and write in V8
CVE-2025-4233Prisma Access Browser: Inappropriate implementation in Cache

Product Status

VersionsAffectedUnaffected
Prisma Access Browser< 136.24.1.93
>= 137.16.2.69

Required Configuration for Exposure

No special configuration is required to be affected by this issue.

Severity: HIGH, Suggested Urgency: MODERATE

CVSS-BT: 8.6 / CVSS-B: 8.6 (CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/AU:N/R:U/V:D/RE:M/U:Amber)

Exploitation Status

Palo Alto Networks is not aware of any malicious exploitation of this issue.

Solution

CVEPrisma Access Browser
CVE-2025-4664
136.24.2.114
CVE-2025-5063
137.16.2.69
CVE-2025-5064
137.16.2.69
CVE-2025-5065
137.16.2.69
CVE-2025-5066
137.16.2.69
CVE-2025-5067
137.16.2.69
CVE-2025-5068
137.16.2.69
CVE-2025-5280
137.16.2.69
CVE-2025-5281
137.16.2.69
CVE-2025-5283
137.16.2.69
CVE-2025-5419
137.16.2.69
CVE-2025-4233136.24.1.93 

Workarounds and Mitigations

No workaround or mitigation is available.

Acknowledgments

Palo Alto Networks thanks Tan Inn Fung, Yu Ann Ong, Zhang Bosen from the GovTech Cybersecurity Group for discovering and reporting CVE-2025-4233.

Timeline

Initial publication
© 2025 Palo Alto Networks, Inc. All rights reserved.