Palo Alto Networks PAN-OS Software Vulnerability Allows Remote Reboot of Firewalls
CVE-2024-3384
7.5HIGH
Key Information:
- Vendor
- Palo Alto Networks
- Vendor
- CVE Published:
- 10 April 2024
Summary
A vulnerability in PAN-OS software from Palo Alto Networks allows remote attackers to exploit Windows New Technology LAN Manager (NTLM) packets. When exploited, this vulnerability enables unauthorized rebooting of PAN-OS firewalls. Continuous attacks may lead to situations where the firewall is forced into maintenance mode, necessitating manual intervention for recovery. Organizations using affected versions are advised to review their security posture and implement necessary precautions to mitigate potential risks from this vulnerability.
Affected Version(s)
PAN-OS 8.1.0 < 8.1.24
PAN-OS 9.0.0 < 9.0.17
PAN-OS 9.1.0 < 9.1.15-h1
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Palo Alto Networks thanks rqu for discovering and reporting this issue.