Impact
A denial of service vulnerability exists in Palo Alto Networks Prisma SD‑WAN ION that allows an unauthenticated attacker on an adjacent network to send a specially crafted IPv6 packet and trigger a system disruption. The flaw stems from unchecked input validation of IPv6 packet headers, which can cause an internal component to fail or restart without leading to code execution or data exposure. The impact is limited to service interruption and does not compromise confidentiality or integrity.
Affected Systems
The issue affects Prisma SD‑WAN ION devices running versions 6.5.1 through 6.5.3, 6.4.1 through 6.4.3, and 6.3.1 through 6.3.6. Versions 6.1 and 5.6 are not impacted. To remediate, users of the affected builds should upgrade to the specified patch levels (6.5.3‑b15 or later, 6.4.3‑b8 or later, or 6.3.6‑b10 or later).
Risk and Exploitability
The CVSS score of 4.9 indicates moderate severity. The EPSS score is not available, and the vulnerability is not listed in CISA's KEV catalog. The likely attack vector is an unauthenticated attacker in the local network adjacent to the SD‑WAN ION device. Exploitation requires only the ability to send malformed IPv6 packets and does not require elevated privileges or complex conditions, making it a moderate but realistic threat to availability.
OpenCVE Enrichment