CVE-2024-3385 — Improper Input Validation in Palo Alto Networks Pan-os
Severity
7.5HIGHNVD
EPSS
2.7%
top 14.20%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 10
Description
A packet processing mechanism in Palo Alto Networks PAN-OS software enables a remote attacker to reboot hardware-based firewalls. Repeated attacks eventually cause the firewall to enter maintenance mode, which requires manual intervention to bring the firewall back online.
This affects the following hardware firewall models:
- PA-5400 Series firewalls
- PA-7000 Series firewalls
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6