CVE-2024-9468

A memory corruption vulnerability in Palo Alto Networks PAN-OS software allows an unauthenticated attacker to crash PAN-OS due to a crafted packet through the data plane, resulting in a denial of service (DoS) condition. Repeated attempts to trigger this condition will result in PAN-OS entering maintenance mode.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
palo_altoCNA
---
---
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 68%
VendorProductVersion
paloaltonetworkspan-os
10.2.0 ≤
𝑥
< 10.2.4
paloaltonetworkspan-os
10.2.5 ≤
𝑥
< 10.2.7
paloaltonetworkspan-os
11.0.0 ≤
𝑥
< 11.0.4
paloaltonetworkspan-os
11.0.5 ≤
𝑥
< 11.0.6
paloaltonetworkspan-os
11.1.0 ≤
𝑥
< 11.1.3
paloaltonetworkspan-os
10.2.4
paloaltonetworkspan-os
10.2.4:h10
paloaltonetworkspan-os
10.2.4:h16
paloaltonetworkspan-os
10.2.4:h2
paloaltonetworkspan-os
10.2.4:h3
paloaltonetworkspan-os
10.2.4:h4
paloaltonetworkspan-os
10.2.7
paloaltonetworkspan-os
10.2.7:h1
paloaltonetworkspan-os
10.2.7:h10
paloaltonetworkspan-os
10.2.7:h11
paloaltonetworkspan-os
10.2.7:h12
paloaltonetworkspan-os
10.2.7:h13
paloaltonetworkspan-os
10.2.7:h14
paloaltonetworkspan-os
10.2.7:h15
paloaltonetworkspan-os
10.2.7:h16
paloaltonetworkspan-os
10.2.7:h17
paloaltonetworkspan-os
10.2.7:h18
paloaltonetworkspan-os
10.2.7:h19
paloaltonetworkspan-os
10.2.7:h2
paloaltonetworkspan-os
10.2.7:h20
paloaltonetworkspan-os
10.2.7:h21
paloaltonetworkspan-os
10.2.7:h22
paloaltonetworkspan-os
10.2.7:h23
paloaltonetworkspan-os
10.2.8
paloaltonetworkspan-os
10.2.8:h1
paloaltonetworkspan-os
10.2.8:h10
paloaltonetworkspan-os
10.2.8:h11
paloaltonetworkspan-os
10.2.8:h12
paloaltonetworkspan-os
10.2.8:h13
paloaltonetworkspan-os
10.2.8:h14
paloaltonetworkspan-os
10.2.8:h15
paloaltonetworkspan-os
10.2.8:h16
paloaltonetworkspan-os
10.2.8:h17
paloaltonetworkspan-os
10.2.8:h18
paloaltonetworkspan-os
10.2.8:h19
paloaltonetworkspan-os
10.2.8:h2
paloaltonetworkspan-os
10.2.8:h3
paloaltonetworkspan-os
10.2.8:h4
paloaltonetworkspan-os
10.2.8:h5
paloaltonetworkspan-os
10.2.8:h6
paloaltonetworkspan-os
10.2.8:h7
paloaltonetworkspan-os
10.2.8:h8
paloaltonetworkspan-os
10.2.8:h9
paloaltonetworkspan-os
10.2.9
paloaltonetworkspan-os
10.2.9:h1
paloaltonetworkspan-os
10.2.9:h2
paloaltonetworkspan-os
10.2.9:h3
paloaltonetworkspan-os
10.2.9:h4
paloaltonetworkspan-os
10.2.9:h5
paloaltonetworkspan-os
10.2.9:h6
paloaltonetworkspan-os
10.2.9:h7
paloaltonetworkspan-os
10.2.9:h8
paloaltonetworkspan-os
10.2.9:h9
paloaltonetworkspan-os
10.2.10
paloaltonetworkspan-os
10.2.10:h1
paloaltonetworkspan-os
10.2.10:h2
paloaltonetworkspan-os
10.2.10:h3
paloaltonetworkspan-os
11.0.4
paloaltonetworkspan-os
11.0.4:h1
paloaltonetworkspan-os
11.0.4:h2
𝑥
= Vulnerable software versions