First published: Wed Apr 10 2024(Updated: )
A packet processing mechanism in Palo Alto Networks PAN-OS software enables a remote attacker to reboot hardware-based firewalls. Repeated attacks eventually cause the firewall to enter maintenance mode, which requires manual intervention to bring the firewall back online. This affects the following hardware firewall models: - PA-5400 Series firewalls - PA-7000 Series firewalls
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Palo Alto Networks PAN-OS | ||
All of | ||
Any of | ||
Paloaltonetworks Pan-os | >=9.0.0<=9.0.16 | |
Paloaltonetworks Pan-os | >=9.1.0<9.1.17 | |
Paloaltonetworks Pan-os | >=10.1.0<10.1.12 | |
Paloaltonetworks Pan-os | >=10.2.0<10.2.8 | |
Paloaltonetworks Pan-os | >=11.0.0<11.0.3 | |
Paloaltonetworks Pan-os | =9.0.17 | |
Paloaltonetworks Pan-os | =9.0.17-h1 | |
Any of | ||
Palo Alto Networks PA-5410 | ||
Paloaltonetworks PA-5420 | ||
Paloaltonetworks PA-5430 | ||
Palo Alto Networks PA-5440 | ||
Paloaltonetworks PA-5445 | ||
Paloaltonetworks Pa-7050 | ||
Paloaltonetworks Pa-7080 |
This issue is fixed in PAN-OS 9.0.17-h4, PAN-OS 9.1.17, PAN-OS 10.1.12, PAN-OS 10.2.8, PAN-OS 11.0.3, and all later PAN-OS versions.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.