First published: Wed Apr 13 2022(Updated: )
An improper handling of exceptional conditions vulnerability exists in the DNS proxy feature of Palo Alto Networks PAN-OS software that enables a meddler-in-the-middle (MITM) to send specifically crafted traffic to the firewall that causes the service to restart unexpectedly. Repeated attempts to send this request result in denial-of-service to all PAN-OS services by restarting the device in maintenance mode. This issue does not impact Panorama appliances and Prisma Access customers. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.22; PAN-OS 9.0 versions earlier than PAN-OS 9.0.16; PAN-OS 9.1 versions earlier than PAN-OS 9.1.13; PAN-OS 10.0 versions earlier than PAN-OS 10.0.10; PAN-OS 10.1 versions earlier than PAN-OS 10.1.5. This issue does not impact PAN-OS 10.2.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Paloaltonetworks Pan-os | >=8.1.0<8.1.22 | |
Paloaltonetworks Pan-os | >=9.0.0<9.0.16 | |
Paloaltonetworks Pan-os | >=9.1.0<9.1.13 | |
Paloaltonetworks Pan-os | >=10.0.0<10.0.10 | |
Paloaltonetworks Pan-os | >=10.1.0<10.1.5 |
This issue is fixed in PAN-OS 8.1.22, PAN-OS 9.0.16, PAN-OS 9.1.13, PAN-OS 10.0.10, PAN-OS 10.1.5, and all later PAN-OS versions.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-0023 is an improper handling of exceptional conditions vulnerability in the DNS proxy feature of Palo Alto Networks PAN-OS software.
CVE-2022-0023 affects Palo Alto Networks PAN-OS versions 8.1.0 to 8.1.22, 9.0.0 to 9.0.16, 9.1.0 to 9.1.13, 10.0.0 to 10.0.10, and 10.1.0 to 10.1.5.
CVE-2022-0023 has a severity rating of medium with a CVSS score of 5.9.
An attacker can exploit CVE-2022-0023 by sending specifically crafted traffic to the firewall's DNS proxy feature, causing it to restart unexpectedly.
Yes, Palo Alto Networks has released patches to address the vulnerability. It is recommended to update to the latest version of PAN-OS.