Palo Alto Networks PAN-OS Software Vulnerability Allows Remote Reboot of Firewalls
CVE-2024-3384

7.5HIGH

Key Information:

Vendor
CVE Published:
10 April 2024

Summary

A vulnerability in PAN-OS software from Palo Alto Networks allows remote attackers to exploit Windows New Technology LAN Manager (NTLM) packets. When exploited, this vulnerability enables unauthorized rebooting of PAN-OS firewalls. Continuous attacks may lead to situations where the firewall is forced into maintenance mode, necessitating manual intervention for recovery. Organizations using affected versions are advised to review their security posture and implement necessary precautions to mitigate potential risks from this vulnerability.

Affected Version(s)

PAN-OS 8.1.0 < 8.1.24

PAN-OS 9.0.0 < 9.0.17

PAN-OS 9.1.0 < 9.1.15-h1

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Palo Alto Networks thanks rqu for discovering and reporting this issue.
.