First published: Wed Apr 10 2024(Updated: )
A memory leak exists in Palo Alto Networks PAN-OS software that enables an attacker to send a burst of crafted packets through the firewall that eventually prevents the firewall from processing traffic. This issue applies only to PA-5400 Series devices that are running PAN-OS software with the SSL Forward Proxy feature enabled.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Palo Alto PAN-OS | ||
All of | ||
Any of | ||
Palo Alto Networks PAN-OS | >=10.2.0<10.2.7 | |
Palo Alto Networks PAN-OS | >=11.0.0<11.0.4 | |
Palo Alto Networks PAN-OS | >=11.1.0<11.1.2 | |
Palo Alto Networks PAN-OS | =10.2.7 | |
Palo Alto Networks PAN-OS | =10.2.7-h1 | |
Any of | ||
Palo Alto Networks PA-5410 | ||
Palo Alto Networks Edge Device | ||
Palo Alto Networks Edge Device | ||
Palo Alto Networks PA-5440 | ||
Palo Alto Networks Edge Device |
This issue is fixed in PAN-OS 10.2.7-h3, PAN-OS 11.0.4, PAN-OS 11.1.2, and all later PAN-OS versions.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-3382 is classified as a high severity vulnerability affecting Palo Alto Networks PAN-OS.
To fix CVE-2024-3382, upgrade your Palo Alto Networks PAN-OS to the latest patch or version provided by the vendor.
CVE-2024-3382 affects PA-5400 Series devices running specific versions of PAN-OS from 10.2.0 to 10.2.7, 11.0.0 to 11.0.4, and 11.1.0 to 11.1.2.
CVE-2024-3382 allows an attacker to exploit a memory leak by sending crafted packets through the firewall, which may lead to traffic processing failures.
Currently, the recommended mitigation for CVE-2024-3382 is to apply the latest updates since no specific workaround has been documented.