A memory leak exists in Palo Alto Networks PAN-OS software that enables an attacker to send a burst of crafted packets through the firewall that eventually prevents the firewall from processing traffic. This issue applies only to PA-5400 Series devices that are running PAN-OS software with the SSL Forward Proxy feature enabled.
Fixes

Solution

This issue is fixed in PAN-OS 10.2.7-h3, PAN-OS 11.0.4, PAN-OS 11.1.2, and all later PAN-OS versions.


Workaround

You can mitigate this issue by disabling decryption on your firewalls. To temporarily disable SSL Decryption, refer to the administrator’s guide for your PAN-OS software (such as PAN-OS 11.1: https://docs.paloaltonetworks.com/pan-os/11-1/pan-os-admin/decryption/temporarily-disable-ssl-decryption) . Additionally, to ensure that decryption remains disabled after a reboot, configure a policy-based decryption exclusion that excludes all traffic from being decrypted ( https://docs.paloaltonetworks.com/pan-os/11-1/pan-os-admin/decryption/decryption-exclusions/create-a-policy-based-decryption-exclusion) .

History

Wed, 22 Jan 2025 16:00:00 +0000

Type Values Removed Values Added
First Time appeared Paloaltonetworks
Paloaltonetworks pa-5410
Paloaltonetworks pa-5420
Paloaltonetworks pa-5430
Paloaltonetworks pa-5440
Paloaltonetworks pa-5445
Paloaltonetworks pan-os
Weaknesses CWE-401
CPEs cpe:2.3:h:paloaltonetworks:pa-5410:-:*:*:*:*:*:*:*
cpe:2.3:h:paloaltonetworks:pa-5420:-:*:*:*:*:*:*:*
cpe:2.3:h:paloaltonetworks:pa-5430:-:*:*:*:*:*:*:*
cpe:2.3:h:paloaltonetworks:pa-5440:-:*:*:*:*:*:*:*
cpe:2.3:h:paloaltonetworks:pa-5445:-:*:*:*:*:*:*:*
cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*
cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:-:*:*:*:*:*:*
cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h1:*:*:*:*:*:*
Vendors & Products Paloaltonetworks
Paloaltonetworks pa-5410
Paloaltonetworks pa-5420
Paloaltonetworks pa-5430
Paloaltonetworks pa-5440
Paloaltonetworks pa-5445
Paloaltonetworks pan-os

cve-icon MITRE

Status: PUBLISHED

Assigner: palo_alto

Published:

Updated: 2024-08-01T20:12:06.637Z

Reserved: 2024-04-05T17:40:15.104Z

Link: CVE-2024-3382

cve-icon Vulnrichment

Updated: 2024-08-01T20:12:06.637Z

cve-icon NVD

Status : Analyzed

Published: 2024-04-10T17:15:56.793

Modified: 2025-01-22T15:44:24.527

Link: CVE-2024-3382

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.