CVE-2024-3384Improper Validation of Syntactic Correctness of Input in Palo Alto Networks Pan-os

Severity
7.5HIGHNVD
EPSS
0.7%
top 27.31%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 10

Description

A vulnerability in Palo Alto Networks PAN-OS software enables a remote attacker to reboot PAN-OS firewalls when receiving Windows New Technology LAN Manager (NTLM) packets from Windows servers. Repeated attacks eventually cause the firewall to enter maintenance mode, which requires manual intervention to bring the firewall back online.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages5 packages

NVDpaloaltonetworks/pan-os8.1.08.1.24+4
CVEListV5palo_alto_networks/pan-os8.1.08.1.24+3
Palo Altopaloalto/pan-os

🔴Vulnerability Details

2
CVEList
PAN-OS: Firewall Denial of Service (DoS) via Malformed NTLM Packets2024-04-10
GHSA
GHSA-hwc4-2rmw-hcvq: A vulnerability in Palo Alto Networks PAN-OS software enables a remote attacker to reboot PAN-OS firewalls when receiving Windows New Technology LAN M2024-04-10

📋Vendor Advisories

1
Palo Alto
PAN-OS: Firewall Denial of Service (DoS) via Malformed NTLM Packets2024-04-10
CVE-2024-3384 — Palo Alto Networks Pan-os vulnerability | cvebase