Home

Description

A Denial of Service vulnerability in the DNS Security feature of Palo Alto Networks PAN-OS software allows an unauthenticated attacker to send a malicious packet through the data plane of the firewall that reboots the firewall. Repeated attempts to trigger this condition will cause the firewall to enter maintenance mode.

PUBLISHED Reserved 2024-04-05 | Published 2024-12-27 | Updated 2025-10-21 | Assigner palo_alto




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/AU:N/R:U/V:C/RE:M/U:Amber

A n a t t a c k e r s e n d s a m a l i c i o u s p a c k e t t h r o u g h t h e f i r e w a l l , w h i c h p r o c e s s e s a m a l i c i o u s p a c k e t t h a t t r i g g e r s t h i s i s s u e .

HIGH: 7.1CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/AU:N/R:U/V:C/RE:M/U:Amber

P r i s m a A c c e s s , w h e n o n l y p r o v i d i n g a c c e s s t o a u t h e n t i c a t e d e n d u s e r s , p r o c e s s e s a m a l i c i o u s p a c k e t t h a t t r i g g e r s t h i s i s s u e .

CISA Known Exploited Vulnerability

Date added 2024-12-30 | Due date 2025-01-20

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Problem types

CWE-754 Improper Check for Unusual or Exceptional Conditions

Product status

Default status
unaffected

All
unaffected

Default status
unaffected

11.2.0 (custom) before 11.2.3
affected

11.1.0 (custom) before 11.1.2-h16
affected

10.2.8 (custom) before 10.2.8-h19
affected

10.1.14 (custom) before 10.1.14-h8
affected

Default status
unaffected

10.2.0 (custom) before 10.2.8
unaffected

11.2.0 (custom) before 11.2.3
affected

Timeline

2024-12-27:Initial publication

Credits

Palo Alto Networks thanks the CERT-EE team for their extra effort in providing invaluable forensic and analytic assistance. reporter

References

www.cisa.gov/...nerabilities-catalog?field_cve=CVE-2024-3393 government-resource

security.paloaltonetworks.com/CVE-2024-3393 vendor-advisory

cve.org (CVE-2024-3393)

nvd.nist.gov (CVE-2024-3393)

Download JSON