CVE-2024-3384 — Improper Validation of Syntactic Correctness of Input in Palo Alto Networks Pan-os
Severity
7.5HIGHNVD
EPSS
0.7%
top 27.31%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 10
Description
A vulnerability in Palo Alto Networks PAN-OS software enables a remote attacker to reboot PAN-OS firewalls when receiving Windows New Technology LAN Manager (NTLM) packets from Windows servers. Repeated attacks eventually cause the firewall to enter maintenance mode, which requires manual intervention to bring the firewall back online.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6