CVE-2024-3393
27.12.2024, 10:15
A Denial of Service vulnerability in the DNS Security feature of Palo Alto Networks PAN-OS software allows an unauthenticated attacker to send a malicious packet through the data plane of the firewall that reboots the firewall. Repeated attempts to trigger this condition will cause the firewall to enter maintenance mode.Enginsight
Vendor | Product | Version |
---|---|---|
paloaltonetworks | pan-os | 11.1.0 ≤ 𝑥 ≤ 11.1.1 |
paloaltonetworks | pan-os | 11.2.0 ≤ 𝑥 < 11.2.3 |
paloaltonetworks | pan-os | 10.1.14 |
paloaltonetworks | pan-os | 10.1.14:h2 |
paloaltonetworks | pan-os | 10.1.14:h4 |
paloaltonetworks | pan-os | 10.1.14:h6 |
paloaltonetworks | pan-os | 10.2.8 |
paloaltonetworks | pan-os | 10.2.8:h10 |
paloaltonetworks | pan-os | 10.2.8:h13 |
paloaltonetworks | pan-os | 10.2.8:h15 |
paloaltonetworks | pan-os | 10.2.8:h18 |
paloaltonetworks | pan-os | 10.2.8:h3 |
paloaltonetworks | pan-os | 10.2.8:h4 |
paloaltonetworks | pan-os | 10.2.9 |
paloaltonetworks | pan-os | 10.2.9:h1 |
paloaltonetworks | pan-os | 10.2.9:h11 |
paloaltonetworks | pan-os | 10.2.9:h14 |
paloaltonetworks | pan-os | 10.2.9:h16 |
paloaltonetworks | pan-os | 10.2.9:h18 |
paloaltonetworks | pan-os | 10.2.9:h9 |
paloaltonetworks | pan-os | 10.2.10 |
paloaltonetworks | pan-os | 10.2.10:h10 |
paloaltonetworks | pan-os | 10.2.10:h2 |
paloaltonetworks | pan-os | 10.2.10:h3 |
paloaltonetworks | pan-os | 10.2.10:h4 |
paloaltonetworks | pan-os | 10.2.10:h5 |
paloaltonetworks | pan-os | 10.2.10:h7 |
paloaltonetworks | pan-os | 10.2.10:h9 |
paloaltonetworks | pan-os | 10.2.11 |
paloaltonetworks | pan-os | 10.2.11:h1 |
paloaltonetworks | pan-os | 10.2.11:h2 |
paloaltonetworks | pan-os | 10.2.11:h3 |
paloaltonetworks | pan-os | 10.2.11:h4 |
paloaltonetworks | pan-os | 10.2.11:h6 |
paloaltonetworks | pan-os | 10.2.11:h9 |
paloaltonetworks | pan-os | 10.2.12 |
paloaltonetworks | pan-os | 10.2.12:h1 |
paloaltonetworks | pan-os | 10.2.12:h2 |
paloaltonetworks | pan-os | 10.2.12:h3 |
paloaltonetworks | pan-os | 10.2.13 |
paloaltonetworks | pan-os | 10.2.13:h1 |
paloaltonetworks | pan-os | 11.1.2 |
paloaltonetworks | pan-os | 11.1.2:h1 |
paloaltonetworks | pan-os | 11.1.2:h12 |
paloaltonetworks | pan-os | 11.1.2:h14 |
paloaltonetworks | pan-os | 11.1.2:h15 |
paloaltonetworks | pan-os | 11.1.2:h3 |
paloaltonetworks | pan-os | 11.1.2:h4 |
paloaltonetworks | pan-os | 11.1.2:h9 |
paloaltonetworks | pan-os | 11.1.3 |
paloaltonetworks | pan-os | 11.1.3:h1 |
paloaltonetworks | pan-os | 11.1.3:h10 |
paloaltonetworks | pan-os | 11.1.3:h11 |
paloaltonetworks | pan-os | 11.1.3:h2 |
paloaltonetworks | pan-os | 11.1.3:h4 |
paloaltonetworks | pan-os | 11.1.3:h6 |
paloaltonetworks | pan-os | 11.1.4 |
paloaltonetworks | pan-os | 11.1.4:h1 |
paloaltonetworks | pan-os | 11.1.4:h4 |
paloaltonetworks | prisma_access | - |
𝑥
= Vulnerable software versions
Common Weakness Enumeration