⚠ Actively exploited
Added to CISA KEV on 2022-08-22. Federal agencies required to patch by 2022-09-12. Required action: Apply updates per vendor instructions..
CVE-2022-0028 — Insufficient Control of Network Message Volume (Network Amplification) in Palo Alto Networks Pan-os
Severity
8.6HIGHNVD
EPSS
4.7%
top 10.65%
CISA KEV
KEV
Added 2022-08-22
Due 2022-09-12
Exploit
Exploited in wild
Active exploitation observed
Timeline
PublishedAug 10
KEV addedAug 22
KEV dueSep 12
CISA Required Action: Apply updates per vendor instructions.
Description
A PAN-OS URL filtering policy misconfiguration could allow a network-based attacker to conduct reflected and amplified TCP denial-of-service (RDoS) attacks. The DoS attack would appear to originate from a Palo Alto Networks PA-Series (hardware), VM-Series (virtual) and CN-Series (container) firewall against an attacker-specified target. To be misused by an external attacker, the firewall configuration must have a URL filtering profile with one or more blocked categories assigned to a source zone…
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:HExploitability: 3.9 | Impact: 4.0
Affected Packages5 packages
🔴Vulnerability Details
3GHSA▶
GHSA-r3j6-h9rm-9q33: A PAN-OS URL filtering policy misconfiguration could allow a network-based attacker to conduct reflected and amplified TCP denial-of-service (RDoS) at↗2022-08-11
CVEList
▶