First published: Wed Apr 10 2024(Updated: )
A vulnerability in Palo Alto Networks PAN-OS software enables a remote attacker to reboot PAN-OS firewalls when receiving Windows New Technology LAN Manager (NTLM) packets from Windows servers. Repeated attacks eventually cause the firewall to enter maintenance mode, which requires manual intervention to bring the firewall back online.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Palo Alto Networks PAN-OS | >=8.1.0<8.1.24 | |
Palo Alto Networks PAN-OS | >=9.0.0<9.0.17 | |
Palo Alto Networks PAN-OS | >=9.1.0<9.1.15 | |
Palo Alto Networks PAN-OS | >=10.0.0<10.0.12 | |
Palo Alto Networks PAN-OS | =9.1.15 | |
Palo Alto PAN-OS |
This issue is fixed in PAN-OS 8.1.24, PAN-OS 9.0.17, PAN-OS 9.1.15-h1, PAN-OS 10.0.12, and all later PAN-OS versions.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-3384 is classified as a high severity vulnerability due to its potential impact on the availability of PAN-OS firewalls.
To fix CVE-2024-3384, upgrade your PAN-OS to a version that is not affected, specifically versions 8.1.25, 9.0.18, 9.1.16, or 10.0.13 and later.
CVE-2024-3384 affects Palo Alto Networks PAN-OS versions 8.1.0 to 8.1.24, 9.0.0 to 9.0.17, 9.1.0 to 9.1.15, and 10.0.0 to 10.0.12.
Attackers can remotely reboot PAN-OS firewalls by sending malicious NTLM packets, causing disruption in network services.
Currently, there are no documented workarounds for CVE-2024-3384 other than updating to a secure version.