Description
A packet processing mechanism in Palo Alto Networks PAN-OS software enables a remote attacker to reboot hardware-based firewalls. Repeated attacks eventually cause the firewall to enter maintenance mode, which requires manual intervention to bring the firewall back online.

This affects the following hardware firewall models:
- PA-5400 Series firewalls
- PA-7000 Series firewalls
Published: 2024-04-10
Score: 7.5 High
EPSS: 2.7% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

This issue is fixed in PAN-OS 9.0.17-h4, PAN-OS 9.1.17, PAN-OS 10.1.12, PAN-OS 10.2.8, PAN-OS 11.0.3, and all later PAN-OS versions.


Vendor Workaround

Customers with a Threat Prevention subscription can block attacks for this vulnerability by enabling Threat ID 94993 (introduced in Applications and Threats content version 8832).

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-31974 A packet processing mechanism in Palo Alto Networks PAN-OS software enables a remote attacker to reboot hardware-based firewalls. Repeated attacks eventually cause the firewall to enter maintenance mode, which requires manual intervention to bring the firewall back online. This affects the following hardware firewall models: - PA-5400 Series firewalls - PA-7000 Series firewalls
History

Fri, 24 Jan 2025 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Paloaltonetworks
Paloaltonetworks pa-5410
Paloaltonetworks pa-5420
Paloaltonetworks pa-5430
Paloaltonetworks pa-5440
Paloaltonetworks pa-5445
Paloaltonetworks pa-7050
Paloaltonetworks pa-7080
Paloaltonetworks pan-os
CPEs cpe:2.3:h:paloaltonetworks:pa-5410:-:*:*:*:*:*:*:*
cpe:2.3:h:paloaltonetworks:pa-5420:-:*:*:*:*:*:*:*
cpe:2.3:h:paloaltonetworks:pa-5430:-:*:*:*:*:*:*:*
cpe:2.3:h:paloaltonetworks:pa-5440:-:*:*:*:*:*:*:*
cpe:2.3:h:paloaltonetworks:pa-5445:-:*:*:*:*:*:*:*
cpe:2.3:h:paloaltonetworks:pa-7050:-:*:*:*:*:*:*:*
cpe:2.3:h:paloaltonetworks:pa-7080:-:*:*:*:*:*:*:*
cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*
cpe:2.3:o:paloaltonetworks:pan-os:9.0.17:-:*:*:*:*:*:*
cpe:2.3:o:paloaltonetworks:pan-os:9.0.17:h1:*:*:*:*:*:*
Vendors & Products Paloaltonetworks
Paloaltonetworks pa-5410
Paloaltonetworks pa-5420
Paloaltonetworks pa-5430
Paloaltonetworks pa-5440
Paloaltonetworks pa-5445
Paloaltonetworks pa-7050
Paloaltonetworks pa-7080
Paloaltonetworks pan-os

Subscriptions

Paloaltonetworks Pa-5410 Pa-5420 Pa-5430 Pa-5440 Pa-5445 Pa-7050 Pa-7080 Pan-os
cve-icon MITRE

Status: PUBLISHED

Assigner: palo_alto

Published:

Updated: 2024-08-22T18:10:55.925Z

Reserved: 2024-04-05T17:40:18.347Z

Link: CVE-2024-3385

cve-icon Vulnrichment

Updated: 2024-08-01T20:12:06.539Z

cve-icon NVD

Status : Analyzed

Published: 2024-04-10T17:15:57.410

Modified: 2025-01-24T15:55:48.127

Link: CVE-2024-3385

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses