Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Palo Alto Releases Patch for PAN-OS DoS Flaw

December 27, 2024
Reading Time: 2 mins read
in Alerts
Palo Alto Releases Patch for PAN-OS DoS Flaw

Palo Alto Networks has issued an urgent security patch for a high-severity vulnerability in its PAN-OS software that could lead to a denial-of-service (DoS) condition on vulnerable devices. The flaw, tracked as CVE-2024-3393, impacts PAN-OS versions 10.X and 11.X, as well as specific releases of Prisma Access. An unauthenticated attacker can exploit this vulnerability by sending malicious DNS packets through the firewall’s data plane, causing the firewall to reboot. If the attack is repeated, the firewall may enter maintenance mode, leading to potential network disruptions. The flaw has been assigned a CVSS score of 8.7, indicating its severity.

The issue is most notably present in firewalls with DNS Security logging enabled, making these devices more susceptible to exploitation. Palo Alto Networks discovered the vulnerability in production use and has received reports of customers experiencing DoS attacks due to the malicious packets. The vulnerability affects firewalls running various PAN-OS releases, with some versions seeing a severity drop to a CVSS score of 7.1 when access is only provided to authenticated users through Prisma Access.

Palo Alto Networks has addressed the issue in several PAN-OS versions, including PAN-OS 10.1.14-h8, PAN-OS 10.2.10-h12, PAN-OS 11.1.5, and PAN-OS 11.2.3, and users are encouraged to update their systems immediately. The company has also extended fixes to other commonly deployed maintenance releases, ensuring broader protection for affected users. However, no fix is available for PAN-OS 11.0, as it has reached its end-of-life status. Organizations using older versions are strongly urged to upgrade to supported releases as soon as possible.

For organizations unable to apply the update immediately, Palo Alto Networks has provided mitigation options. Customers with unmanaged firewalls or those managed by Panorama can disable DNS Security logging by adjusting settings in the Anti-Spyware profile. Similarly, users managing firewalls via Strata Cloud Manager (SCM) can disable logging across all devices or reach out to Palo Alto Networks support for assistance. While these workarounds can help mitigate risk, a full update to the latest PAN-OS version remains the most effective solution to eliminate the vulnerability.

Reference:
  • Palo Alto Networks Patches High-Severity PAN-OS DoS Vulnerability
Tags: Cyber AlertsCyber Alerts 2024Cyber threatsDecember 2024DNSDNS SecurityDOSFirewallPalo Alto NetworksVulnerabilities
ADVERTISEMENT

Related Posts

APT41 Uses Google Calendar For C2 Operations

APT41 Uses Google Calendar For C2 Operations

May 29, 2025
APT41 Uses Google Calendar For C2 Operations

New PumaBot IoT Botnet Uses SSH Attack

May 29, 2025
APT41 Uses Google Calendar For C2 Operations

New NodeSnake RAT Hits UK Universities

May 29, 2025
Fake DocuSign Alerts Target Corporate Logins

Fake DocuSign Alerts Target Corporate Logins

May 28, 2025
Fake DocuSign Alerts Target Corporate Logins

Fake Bitdefender Site Spreads Venom Malware

May 28, 2025
Fake DocuSign Alerts Target Corporate Logins

Microsoft Void Blizzard Cyber Threat Alert

May 28, 2025

Latest Alerts

New PumaBot IoT Botnet Uses SSH Attack

APT41 Uses Google Calendar For C2 Operations

New NodeSnake RAT Hits UK Universities

Microsoft Void Blizzard Cyber Threat Alert

Fake DocuSign Alerts Target Corporate Logins

Fake Bitdefender Site Spreads Venom Malware

Subscribe to our newsletter

    Latest Incidents

    Cork Protocol Paused After $12M Exploit

    Victoria’s Secret Site Down After Breach

    LexisNexis GitHub Breach Affects 364K People

    Migos IG Hack Blackmails Solana Cofounder

    Tiffany & Co. Faces Data Breach Incident

    MathWorks Crippled by Ransomware Attack

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial