First published: Wed Apr 10 2024(Updated: )
A memory leak exists in Palo Alto Networks PAN-OS software that enables an attacker to send a burst of crafted packets through the firewall that eventually prevents the firewall from processing traffic. This issue applies only to PA-5400 Series devices that are running PAN-OS software with the SSL Forward Proxy feature enabled.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Palo Alto Networks PAN-OS | ||
All of | ||
Any of | ||
Paloaltonetworks Pan-os | >=10.2.0<10.2.7 | |
Paloaltonetworks Pan-os | >=11.0.0<11.0.4 | |
Paloaltonetworks Pan-os | >=11.1.0<11.1.2 | |
Paloaltonetworks Pan-os | =10.2.7 | |
Paloaltonetworks Pan-os | =10.2.7-h1 | |
Any of | ||
Palo Alto Networks PA-5410 | ||
Paloaltonetworks PA-5420 | ||
Paloaltonetworks PA-5430 | ||
Palo Alto Networks PA-5440 | ||
Paloaltonetworks PA-5445 |
This issue is fixed in PAN-OS 10.2.7-h3, PAN-OS 11.0.4, PAN-OS 11.1.2, and all later PAN-OS versions.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.