First published: Wed Nov 13 2024(Updated: )
A null pointer dereference vulnerability in the GlobalProtect gateway in Palo Alto Networks PAN-OS software enables an unauthenticated attacker to stop the GlobalProtect service on the firewall by sending a specially crafted packet that causes a denial of service (DoS) condition. Repeated attempts to trigger this condition result in the firewall entering maintenance mode.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Palo Alto Networks Cloud NGFW | ||
Palo Alto Networks PAN-OS | <11.1.5=11.1.0<11.0.6=11.0.0<10.2.11=10.2.0 | 11.1.5 11.1.4-h9 11.0.6 10.2.11 10.2.10-h10 10.2.9-h18 10.2.8-h18 |
Palo Alto Networks Prisma Access |
This issue is fixed in PAN-OS 10.2.11, PAN-OS 11.0.6, PAN-OS 11.1.5, and all later PAN-OS versions.
No workaround or mitigation is available.
This issue is fixed in PAN-OS 10.2.11, PAN-OS 11.0.6, PAN-OS 11.1.5, and all later PAN-OS versions. In addition, in an attempt to provide the most seamless upgrade path for our customers, we are making additional fixes available as noted below: * Additional 11.1 fix: * 11.1.4-h9 * Additional 10.2 fixes: * 10.2.10-h10 * 10.2.9-h18 * 10.2.8-h18
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.