CVE-2024-3385Improper Input Validation in Palo Alto Networks Pan-os

Severity
7.5HIGHNVD
EPSS
2.7%
top 14.20%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 10

Description

A packet processing mechanism in Palo Alto Networks PAN-OS software enables a remote attacker to reboot hardware-based firewalls. Repeated attacks eventually cause the firewall to enter maintenance mode, which requires manual intervention to bring the firewall back online. This affects the following hardware firewall models: - PA-5400 Series firewalls - PA-7000 Series firewalls

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages5 packages

NVDpaloaltonetworks/pan-os9.1.09.1.17+5
CVEListV5palo_alto_networks/pan-os9.0.09.0.17-h4+4
Palo Altopaloalto/pan-os

🔴Vulnerability Details

2
CVEList
PAN-OS: Firewall Denial of Service (DoS) when GTP Security is Disabled2024-04-10
GHSA
GHSA-8x2m-vwxp-r65j: A packet processing mechanism in Palo Alto Networks PAN-OS software enables a remote attacker to reboot hardware-based firewalls2024-04-10

📋Vendor Advisories

1
Palo Alto
PAN-OS: Firewall Denial of Service (DoS) when GTP Security is Disabled2024-04-10
CVE-2024-3385 — Improper Input Validation in Palo | cvebase