CVE-2024-3385

A packet processing mechanism in Palo Alto Networks PAN-OS software enables a remote attacker to reboot hardware-based firewalls. Repeated attacks eventually cause the firewall to enter maintenance mode, which requires manual intervention to bring the firewall back online.

This affects the following hardware firewall models:
- PA-5400 Series firewalls
- PA-7000 Series firewalls
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
palo_altoCNA
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVEADP
---
---
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 80%
VendorProductVersion
paloaltonetworkspan-os
9.0.0 ≤
𝑥
≤ 9.0.16
paloaltonetworkspan-os
9.1.0 ≤
𝑥
< 9.1.17
paloaltonetworkspan-os
10.1.0 ≤
𝑥
< 10.1.12
paloaltonetworkspan-os
10.2.0 ≤
𝑥
< 10.2.8
paloaltonetworkspan-os
11.0.0 ≤
𝑥
< 11.0.3
paloaltonetworkspan-os
9.0.17
paloaltonetworkspan-os
9.0.17:h1
𝑥
= Vulnerable software versions