Home

Description

A denial-of-service (DoS) vulnerability in the Advanced DNS Security (ADNS) feature of Palo Alto Networks PAN-OS® software enables an unauthenticated attacker to initiate system reboots using a maliciously crafted packet. Repeated attempts to initiate a reboot causes the firewall to enter maintenance mode. Cloud NGFW and Prisma Access® are not impacted by this vulnerability.

PUBLISHED Reserved 2025-11-03 | Published 2026-02-11 | Updated 2026-02-11 | Assigner palo_alto




MEDIUM: 6.6CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/AU:Y/R:U/V:D/RE:M/U:Amber

Problem types

CWE-754 Improper Check for Unusual or Exceptional Conditions

Product status

Default status
unaffected

All (custom)
unaffected

Default status
unaffected

12.1.0 (custom) before 12.1.4
affected

11.2.0 (custom) before 11.2.10
affected

11.1.0 (custom) before 11.1.11
unaffected

10.2.0 (custom) before 10.2.17
unaffected

Default status
unaffected

All (custom) before 10.2.10-h28
unaffected

Timeline

2026-02-11:Initial Publication

Credits

an internal reporter, jliu@TikkalaSecurity, finder

References

security.paloaltonetworks.com/CVE-2026-0229 vendor-advisory

cve.org (CVE-2026-0229)

nvd.nist.gov (CVE-2026-0229)

Download JSON