CVE-2024-9468
09.10.2024, 17:15
A memory corruption vulnerability in Palo Alto Networks PAN-OS software allows an unauthenticated attacker to crash PAN-OS due to a crafted packet through the data plane, resulting in a denial of service (DoS) condition. Repeated attempts to trigger this condition will result in PAN-OS entering maintenance mode.Enginsight
| Vendor | Product | Version |
|---|---|---|
| paloaltonetworks | pan-os | 10.2.0 ≤ 𝑥 < 10.2.4 |
| paloaltonetworks | pan-os | 10.2.5 ≤ 𝑥 < 10.2.7 |
| paloaltonetworks | pan-os | 11.0.0 ≤ 𝑥 < 11.0.4 |
| paloaltonetworks | pan-os | 11.0.5 ≤ 𝑥 < 11.0.6 |
| paloaltonetworks | pan-os | 11.1.0 ≤ 𝑥 < 11.1.3 |
| paloaltonetworks | pan-os | 10.2.4 |
| paloaltonetworks | pan-os | 10.2.4:h10 |
| paloaltonetworks | pan-os | 10.2.4:h16 |
| paloaltonetworks | pan-os | 10.2.4:h2 |
| paloaltonetworks | pan-os | 10.2.4:h3 |
| paloaltonetworks | pan-os | 10.2.4:h4 |
| paloaltonetworks | pan-os | 10.2.7 |
| paloaltonetworks | pan-os | 10.2.7:h1 |
| paloaltonetworks | pan-os | 10.2.7:h10 |
| paloaltonetworks | pan-os | 10.2.7:h11 |
| paloaltonetworks | pan-os | 10.2.7:h12 |
| paloaltonetworks | pan-os | 10.2.7:h13 |
| paloaltonetworks | pan-os | 10.2.7:h14 |
| paloaltonetworks | pan-os | 10.2.7:h15 |
| paloaltonetworks | pan-os | 10.2.7:h16 |
| paloaltonetworks | pan-os | 10.2.7:h17 |
| paloaltonetworks | pan-os | 10.2.7:h18 |
| paloaltonetworks | pan-os | 10.2.7:h19 |
| paloaltonetworks | pan-os | 10.2.7:h2 |
| paloaltonetworks | pan-os | 10.2.7:h20 |
| paloaltonetworks | pan-os | 10.2.7:h21 |
| paloaltonetworks | pan-os | 10.2.7:h22 |
| paloaltonetworks | pan-os | 10.2.7:h23 |
| paloaltonetworks | pan-os | 10.2.8 |
| paloaltonetworks | pan-os | 10.2.8:h1 |
| paloaltonetworks | pan-os | 10.2.8:h10 |
| paloaltonetworks | pan-os | 10.2.8:h11 |
| paloaltonetworks | pan-os | 10.2.8:h12 |
| paloaltonetworks | pan-os | 10.2.8:h13 |
| paloaltonetworks | pan-os | 10.2.8:h14 |
| paloaltonetworks | pan-os | 10.2.8:h15 |
| paloaltonetworks | pan-os | 10.2.8:h16 |
| paloaltonetworks | pan-os | 10.2.8:h17 |
| paloaltonetworks | pan-os | 10.2.8:h18 |
| paloaltonetworks | pan-os | 10.2.8:h19 |
| paloaltonetworks | pan-os | 10.2.8:h2 |
| paloaltonetworks | pan-os | 10.2.8:h3 |
| paloaltonetworks | pan-os | 10.2.8:h4 |
| paloaltonetworks | pan-os | 10.2.8:h5 |
| paloaltonetworks | pan-os | 10.2.8:h6 |
| paloaltonetworks | pan-os | 10.2.8:h7 |
| paloaltonetworks | pan-os | 10.2.8:h8 |
| paloaltonetworks | pan-os | 10.2.8:h9 |
| paloaltonetworks | pan-os | 10.2.9 |
| paloaltonetworks | pan-os | 10.2.9:h1 |
| paloaltonetworks | pan-os | 10.2.9:h2 |
| paloaltonetworks | pan-os | 10.2.9:h3 |
| paloaltonetworks | pan-os | 10.2.9:h4 |
| paloaltonetworks | pan-os | 10.2.9:h5 |
| paloaltonetworks | pan-os | 10.2.9:h6 |
| paloaltonetworks | pan-os | 10.2.9:h7 |
| paloaltonetworks | pan-os | 10.2.9:h8 |
| paloaltonetworks | pan-os | 10.2.9:h9 |
| paloaltonetworks | pan-os | 10.2.10 |
| paloaltonetworks | pan-os | 10.2.10:h1 |
| paloaltonetworks | pan-os | 10.2.10:h2 |
| paloaltonetworks | pan-os | 10.2.10:h3 |
| paloaltonetworks | pan-os | 11.0.4 |
| paloaltonetworks | pan-os | 11.0.4:h1 |
| paloaltonetworks | pan-os | 11.0.4:h2 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration