First published: Wed Nov 13 2024(Updated: )
A null pointer dereference vulnerability in the GlobalProtect gateway in Palo Alto Networks PAN-OS software enables an unauthenticated attacker to stop the GlobalProtect service on the firewall by sending a specially crafted packet that causes a denial of service (DoS) condition. Repeated attempts to trigger this condition result in the firewall entering maintenance mode.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Palo Alto Networks Cloud NGFW | ||
Palo Alto Networks PAN-OS | <11.1.5=11.1.0<11.0.6=11.0.0<10.2.11=10.2.0 | 11.1.5 11.1.4-h9 11.0.6 10.2.11 10.2.10-h10 10.2.9-h18 10.2.8-h18 10.2.7-h21 |
Palo Alto Networks Prisma Access | ||
Palo Alto Networks PAN-OS | >=10.2.0<10.2.7 | |
Palo Alto Networks PAN-OS | >=11.0.0<11.0.6 | |
Palo Alto Networks PAN-OS | >=11.1.0<11.1.4 | |
Palo Alto Networks PAN-OS | =10.2.7-h1 | |
Palo Alto Networks PAN-OS | =10.2.7-h12 | |
Palo Alto Networks PAN-OS | =10.2.7-h16 | |
Palo Alto Networks PAN-OS | =10.2.7-h18 | |
Palo Alto Networks PAN-OS | =10.2.7-h19 | |
Palo Alto Networks PAN-OS | =10.2.7-h3 | |
Palo Alto Networks PAN-OS | =10.2.7-h6 | |
Palo Alto Networks PAN-OS | =10.2.7-h8 | |
Palo Alto Networks PAN-OS | =10.2.8 | |
Palo Alto Networks PAN-OS | =10.2.8-h10 | |
Palo Alto Networks PAN-OS | =10.2.8-h13 | |
Palo Alto Networks PAN-OS | =10.2.8-h15 | |
Palo Alto Networks PAN-OS | =10.2.8-h3 | |
Palo Alto Networks PAN-OS | =10.2.8-h4 | |
Palo Alto Networks PAN-OS | =10.2.9 | |
Palo Alto Networks PAN-OS | =10.2.9-h1 | |
Palo Alto Networks PAN-OS | =10.2.9-h11 | |
Palo Alto Networks PAN-OS | =10.2.9-h14 | |
Palo Alto Networks PAN-OS | =10.2.9-h16 | |
Palo Alto Networks PAN-OS | =10.2.9-h9 | |
Palo Alto Networks PAN-OS | =10.2.10 | |
Palo Alto Networks PAN-OS | =10.2.10-h2 | |
Palo Alto Networks PAN-OS | =10.2.10-h3 | |
Palo Alto Networks PAN-OS | =10.2.10-h4 | |
Palo Alto Networks PAN-OS | =10.2.10-h5 | |
Palo Alto Networks PAN-OS | =10.2.10-h7 | |
Palo Alto Networks PAN-OS | =10.2.10-h9 | |
Palo Alto Networks PAN-OS | =11.1.4 | |
Palo Alto Networks PAN-OS | =11.1.4-h1 | |
Palo Alto Networks PAN-OS | =11.1.4-h4 | |
Palo Alto Networks PAN-OS | =11.1.4-h7 |
This issue is fixed in PAN-OS 10.2.11, PAN-OS 11.0.6, PAN-OS 11.1.5, and all later PAN-OS versions.
No workaround or mitigation is available.
This issue is fixed in PAN-OS 10.2.11, PAN-OS 11.0.6, PAN-OS 11.1.5, and all later PAN-OS versions. In addition, in an attempt to provide the most seamless upgrade path for our customers, we are making additional fixes available as noted below: * Additional 11.1 fix: * 11.1.4-h9 * Additional 10.2 fixes: * 10.2.10-h10 * 10.2.9-h18 * 10.2.8-h18 * 10.2.7-h21
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-2550 is classified as a denial-of-service vulnerability which can lead to significant service disruption.
To mitigate CVE-2024-2550, upgrade your Palo Alto Networks PAN-OS to versions 11.1.5, 11.0.6, 10.2.11 or apply the relevant security patches.
CVE-2024-2550 impacts Palo Alto Networks PAN-OS, Prisma Access, and Cloud NGFW products.
CVE-2024-2550 can be exploited by an unauthenticated attacker sending a specially crafted packet to the GlobalProtect gateway.
Exploitation of CVE-2024-2550 can lead to a denial of service, causing the GlobalProtect service on the firewall to stop functioning.