Security software company Palo Alto Networks has confirmed the active exploitation of a critical vulnerability, known as CVE-2025-0108. When combined with two previously identified flaws, hackers are able to bypass authentication measures and gain full access to a system.
With root access, the user has all privileges and complete control over functions and files within the system. This includes the ability to install and delete software, modify system settings, and create, modify, or delete files in any part of the system.
While root access can be beneficial for experienced users and developers looking for more control over their devices, it also comes with risks. Making incorrect changes or installing malicious software can potentially cause damage to the device or compromise its security.