We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A Denial of Service vulnerability in the DNS Security feature of Palo Alto Networks PAN-OS software allows an unauthenticated attacker to send a malicious packet through the data plane of the firewall that reboots the firewall. Repeated attempts to trigger this condition will cause the firewall to enter maintenance mode.
Reserved 2024-04-05 | Published 2024-12-27 | Updated 2024-12-30 | Assigner palo_altoAn attacker sends a malicious packet through the firewall, which processes a malicious packet that triggers this issue.
Prisma Access, when only providing access to authenticated end users, processes a malicious packet that triggers this issue.
Date added 2024-12-30 | Due date 2025-01-20
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
CWE-754 Improper Check for Unusual or Exceptional Conditions
2024-12-27: | Initial publication |
Palo Alto Networks thanks the CERT-EE team for their extra effort in providing invaluable forensic and analytic assistance.
security.paloaltonetworks.com/CVE-2024-3393
Support options