CVE-2024-3385

Severity CVSS v4.0:
Pending analysis
Type:
CWE-20 Input Validation
Publication date:
10/04/2024
Last modified:
24/01/2025

Description

A packet processing mechanism in Palo Alto Networks PAN-OS software enables a remote attacker to reboot hardware-based firewalls. Repeated attacks eventually cause the firewall to enter maintenance mode, which requires manual intervention to bring the firewall back online.<br /> <br /> This affects the following hardware firewall models:<br /> - PA-5400 Series firewalls<br /> - PA-7000 Series firewalls

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:* 9.0.0 (including) 9.0.16 (including)
cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:* 9.1.0 (including) 9.1.17 (excluding)
cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:* 10.1.0 (including) 10.1.12 (excluding)
cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:* 10.2.0 (including) 10.2.8 (excluding)
cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:* 11.0.0 (including) 11.0.3 (excluding)
cpe:2.3:o:paloaltonetworks:pan-os:9.0.17:-:*:*:*:*:*:*
cpe:2.3:o:paloaltonetworks:pan-os:9.0.17:h1:*:*:*:*:*:*
cpe:2.3:h:paloaltonetworks:pa-5410:-:*:*:*:*:*:*:*
cpe:2.3:h:paloaltonetworks:pa-5420:-:*:*:*:*:*:*:*
cpe:2.3:h:paloaltonetworks:pa-5430:-:*:*:*:*:*:*:*
cpe:2.3:h:paloaltonetworks:pa-5440:-:*:*:*:*:*:*:*
cpe:2.3:h:paloaltonetworks:pa-5445:-:*:*:*:*:*:*:*
cpe:2.3:h:paloaltonetworks:pa-7050:-:*:*:*:*:*:*:*
cpe:2.3:h:paloaltonetworks:pa-7080:-:*:*:*:*:*:*:*