• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
palo alto releases patch for pan os dos flaw — update

Palo Alto Releases Patch for PAN-OS DoS Flaw — Update Immediately

You are here: Home / General Cyber Security News / Palo Alto Releases Patch for PAN-OS DoS Flaw — Update Immediately
December 27, 2024

Palo Alto Networks has disclosed a high-severity vulnerability impacting PAN-OS software that could cause a denial-of-service (DoS) condition on susceptible devices.

The flaw, tracked as CVE-2024-3393 (CVSS score: 8.7), impacts PAN-OS versions 10.X and 11.X, as well as Prisma Access running PAN-OS versions. It has been addressed in PAN-OS 10.1.14-h8, PAN-OS 10.2.10-h12, PAN-OS 11.1.5, PAN-OS 11.2.3, and all later PAN-OS versions.

“A denial-of-service vulnerability in the DNS Security feature of Palo Alto Networks PAN-OS software allows an unauthenticated attacker to send a malicious packet through the data plane of the firewall that reboots the firewall,” the company said in a Friday advisory.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


“Repeated attempts to trigger this condition will cause the firewall to enter maintenance mode.”

Cybersecurity

Palo Alto Networks said it discovered the flaw in production use, and that it’s aware of customers “experiencing this denial-of-service (DoS) when their firewall blocks malicious DNS packets that trigger this issue.”

The extent of the activity is presently unknown. The Hacker News has reached out to Palo Alto Networks for further comment, and we will update the story if we hear back.

It’s worth pointing out that firewalls that have the DNS Security logging enabled are affected by CVE-2024-3393. The severity of the flaw also drops to a CVSS score of 7.1 when access is only provided to authenticated end users via Prisma Access.

The fixes have also been extended to other commonly deployed maintenance releases –

  • PAN-OS 11.1 (11.1.2-h16, 11.1.3-h13, 11.1.4-h7, and 11.1.5)
  • PAN-OS 10.2 (10.2.8-h19, 10.2.9-h19, 10.2.10-h12, 10.2.11-h10, 10.2.12-h4, 10.2.13-h2, and 10.2.14)
  • PAN-OS 10.1 (10.1.14-h8 and 10.1.15)
  • PAN-OS 10.2.9-h19 and 10.2.10-h12 (only applicable to Prisma Access)
  • PAN-OS 11.0 (No fix owing to it reaching end-of-life status on November 17, 2024)

Cybersecurity

As workarounds and mitigations for unmanaged firewalls or those managed by Panorama, customers have the option of setting Log Severity to “none” for all configured DNS Security categories for each Anti-Spyware profile by navigating to Objects > Security Profiles > Anti-spyware > (select a profile) > DNS Policies > DNS Security.

For firewalls managed by Strata Cloud Manager (SCM), users can either follow the above steps to disable DNS Security logging directly on each device, or across all of them by opening a support case. For Prisma Access tenants managed by SCM, it’s recommended to open a support case to turn off logging until an upgrade is carried out.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «ficora and kaiten botnets exploit old d link vulnerabilities for global FICORA and Kaiten Botnets Exploit Old D-Link Vulnerabilities for Global Attacks
Next Post: Cloud Atlas Deploys VBCloud Malware: Over 80% of Targets Found in Russia cloud atlas deploys vbcloud malware: over 80% of targets found»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • OpenAI Unveils Aardvark: GPT-5 Agent That Finds and Fixes Code Flaws Automatically
  • Nation-State Hackers Deploy New Airstalk Malware in Suspected Supply Chain Attack
  • China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats
  • China-Linked Tick Group Exploits Lanscope Zero-Day to Hijack Corporate Systems
  • The MSP Cybersecurity Readiness Guide: Turning Security into Growth
  • CISA and NSA Issue Urgent Guidance to Secure WSUS and Microsoft Exchange Servers
  • Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery
  • CISA Flags VMware Zero-Day Exploited by China-Linked Hackers in Active Attacks
  • A New Security Layer for macOS Takes Aim at Admin Errors Before Hackers Do
  • Google’s Built-In AI Defenses on Android Now Block 10 Billion Scam Messages a Month

Copyright © TheCyberSecurity.News, All Rights Reserved.