First published: Wed Sep 08 2021(Updated: )
An improper handling of exceptional conditions vulnerability exists in the Palo Alto Networks PAN-OS dataplane that enables an unauthenticated network-based attacker to send specifically crafted traffic through the firewall that causes the service to crash. Repeated attempts to send this request result in denial of service to all PAN-OS services by restarting the device and putting it into maintenance mode. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.20; PAN-OS 9.0 versions earlier than PAN-OS 9.0.14; PAN-OS 9.1 versions earlier than PAN-OS 9.1.9; PAN-OS 10.0 versions earlier than PAN-OS 10.0.5. This issue does not affect Prisma Access.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Palo Alto Networks PAN-OS | >=8.1.0<8.1.20 | |
Palo Alto Networks PAN-OS | >=9.0.0<9.0.14 | |
Palo Alto Networks PAN-OS | >=9.1.0<9.1.9 | |
Palo Alto Networks PAN-OS | >=10.0.0<10.0.5 |
This issue is fixed in PAN-OS 8.1.20, PAN-OS 9.0.14, PAN-OS 9.1.9, PAN-OS 10.0.5, and all later PAN-OS versions.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-3053 is an improper handling of exceptional conditions vulnerability in the Palo Alto Networks PAN-OS dataplane.
CVE-2021-3053 affects Palo Alto Networks PAN-OS versions 8.1.0 to 8.1.20, 9.0.0 to 9.0.14, 9.1.0 to 9.1.9, and 10.0.0 to 10.0.5.
CVE-2021-3053 has a severity rating of 7.5 (High).
An unauthenticated network-based attacker can exploit CVE-2021-3053 by sending specifically crafted traffic through the firewall, causing the service to crash.
Yes, Palo Alto Networks has released security updates to address CVE-2021-3053.