CVE-2024-3385
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
10/04/2024
Last modified:
24/01/2025
Description
A packet processing mechanism in Palo Alto Networks PAN-OS software enables a remote attacker to reboot hardware-based firewalls. Repeated attacks eventually cause the firewall to enter maintenance mode, which requires manual intervention to bring the firewall back online.<br />
<br />
This affects the following hardware firewall models:<br />
- PA-5400 Series firewalls<br />
- PA-7000 Series firewalls
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:* | 9.0.0 (including) | 9.0.16 (including) |
| cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:* | 9.1.0 (including) | 9.1.17 (excluding) |
| cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:* | 10.1.0 (including) | 10.1.12 (excluding) |
| cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:* | 10.2.0 (including) | 10.2.8 (excluding) |
| cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:* | 11.0.0 (including) | 11.0.3 (excluding) |
| cpe:2.3:o:paloaltonetworks:pan-os:9.0.17:-:*:*:*:*:*:* | ||
| cpe:2.3:o:paloaltonetworks:pan-os:9.0.17:h1:*:*:*:*:*:* | ||
| cpe:2.3:h:paloaltonetworks:pa-5410:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:paloaltonetworks:pa-5420:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:paloaltonetworks:pa-5430:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:paloaltonetworks:pa-5440:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:paloaltonetworks:pa-5445:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:paloaltonetworks:pa-7050:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:paloaltonetworks:pa-7080:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



