First published: Wed Oct 09 2024(Updated: )
A memory corruption vulnerability in Palo Alto Networks PAN-OS software allows an unauthenticated attacker to crash PAN-OS due to a crafted packet through the data plane, resulting in a denial of service (DoS) condition. Repeated attempts to trigger this condition will result in PAN-OS entering maintenance mode.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Palo Alto Networks PAN-OS | <10.2.9-h11=10.2<11.0.4-h5=11.0<11.1.3=11.1 | 10.2.9-h11 10.2.10-h4 10.2.11 11.0.4-h5 11.0.6 11.1.3 |
Palo Alto Networks Cloud NGFW | ||
Palo Alto Networks Prisma Access |
This issue is fixed in 10.2.9-h11, 10.2.10-h4, PAN-OS 10.2.11, PAN-OS 11.0.4-h5, PAN-OS 11.0.6, PAN-OS 11.1.3, and all later PAN-OS versions.
Customers can block attacks for this vulnerability by disabling this setting: Device > Setup Session > Decryption Settings > SSL Decryption Settings > Send handshake messages to CTD for inspection. Customers with a Threat Prevention subscription, who want to keep domain fronting detection enabled, can block attacks for this vulnerability by enabling Threat ID 94971 (introduced in Applications and Threats content version 8854).
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-9468 is categorized as a denial of service (DoS) vulnerability due to memory corruption in Palo Alto Networks PAN-OS.
To mitigate CVE-2024-9468, upgrade to the latest patched version of PAN-OS recommended by Palo Alto Networks.
CVE-2024-9468 affects users of Palo Alto Networks PAN-OS versions up to 10.2.9-h11, 11.0.4-h5, and specific versions of Cloud NGFW and Prisma Access.
Exploitation of CVE-2024-9468 can lead to an attacker being able to crash PAN-OS, causing a denial of service condition.
Yes, CVE-2024-9468 can be exploited remotely by an unauthenticated attacker.