First published: Wed Aug 11 2021(Updated: )
Certain invalid URL entries contained in an External Dynamic List (EDL) cause the Device Server daemon (devsrvr) to stop responding. This condition causes subsequent commits on the firewall to fail and prevents administrators from performing commits and configuration changes even though the firewall remains otherwise functional. If the firewall then restarts, it results in a denial-of-service (DoS) condition and the firewall stops processing traffic. This issue impacts: PAN-OS 9.0 versions earlier than PAN-OS 9.0.14; PAN-OS 9.1 versions earlier than PAN-OS 9.1.9; PAN-OS 10.0 versions earlier than PAN-OS 10.0.5. PAN-OS 8.1 and PAN-OS 10.1 versions are not impacted.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Palo Alto Networks PAN-OS | >=9.0.0<9.0.14 | |
Palo Alto Networks PAN-OS | >=9.1.0<9.1.9 | |
Palo Alto Networks PAN-OS | >=10.0.0<10.0.5 |
This issue is fixed in PAN-OS 9.0.14, PAN-OS 9.1.9, PAN-OS 10.0.5, and all later PAN-OS versions. If a firewall encounters this problem, you will require TAC assistance to make the firewall operational again.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-3048 is medium with a severity value of 5.9.
The affected software for CVE-2021-3048 is Paloaltonetworks Pan-os versions 9.0.0 to 9.0.14, 9.1.0 to 9.1.9, and 10.0.0 to 10.0.5.
CVE-2021-3048 causes the Device Server daemon (devsrvr) to stop responding, leading to failed commits and configuration changes on the firewall.
To fix CVE-2021-3048, update your Paloaltonetworks Pan-os software to a version that is not affected by the vulnerability.
For more information about CVE-2021-3048, you can refer to the following references: [link1] [link2].