First published: Wed Oct 09 2024(Updated: )
A memory corruption vulnerability in Palo Alto Networks PAN-OS software allows an unauthenticated attacker to crash PAN-OS due to a crafted packet through the data plane, resulting in a denial of service (DoS) condition. Repeated attempts to trigger this condition will result in PAN-OS entering maintenance mode.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Palo Alto Networks PAN-OS | <10.2.9-h11=10.2<11.0.4-h5=11.0<11.1.3=11.1 | 10.2.9-h11 10.2.10-h4 10.2.11 11.0.4-h5 11.0.6 11.1.3 |
Palo Alto Networks Cloud NGFW | ||
Palo Alto Networks Prisma Access |
This issue is fixed in 10.2.9-h11, 10.2.10-h4, PAN-OS 10.2.11, PAN-OS 11.0.4-h5, PAN-OS 11.0.6, PAN-OS 11.1.3, and all later PAN-OS versions.
Customers can block attacks for this vulnerability by disabling this setting: Device > Setup Session > Decryption Settings > SSL Decryption Settings > Send handshake messages to CTD for inspection. Customers with a Threat Prevention subscription, who want to keep domain fronting detection enabled, can block attacks for this vulnerability by enabling Threat ID 94971 (introduced in Applications and Threats content version 8854).
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.