FKIE_CVE-2024-3393

Vulnerability from fkie_nvd - Published: 2024-12-27 10:15 - Updated: 2025-11-04 16:49
Summary
A Denial of Service vulnerability in the DNS Security feature of Palo Alto Networks PAN-OS software allows an unauthenticated attacker to send a malicious packet through the data plane of the firewall that reboots the firewall. Repeated attempts to trigger this condition will cause the firewall to enter maintenance mode.
Impacted products
Vendor Product Version
paloaltonetworks pan-os *
paloaltonetworks pan-os *
paloaltonetworks pan-os 10.1.14
paloaltonetworks pan-os 10.1.14
paloaltonetworks pan-os 10.1.14
paloaltonetworks pan-os 10.1.14
paloaltonetworks pan-os 10.2.8
paloaltonetworks pan-os 10.2.8
paloaltonetworks pan-os 10.2.8
paloaltonetworks pan-os 10.2.8
paloaltonetworks pan-os 10.2.8
paloaltonetworks pan-os 10.2.8
paloaltonetworks pan-os 10.2.8
paloaltonetworks pan-os 10.2.9
paloaltonetworks pan-os 10.2.9
paloaltonetworks pan-os 10.2.9
paloaltonetworks pan-os 10.2.9
paloaltonetworks pan-os 10.2.9
paloaltonetworks pan-os 10.2.9
paloaltonetworks pan-os 10.2.9
paloaltonetworks pan-os 10.2.10
paloaltonetworks pan-os 10.2.10
paloaltonetworks pan-os 10.2.10
paloaltonetworks pan-os 10.2.10
paloaltonetworks pan-os 10.2.10
paloaltonetworks pan-os 10.2.10
paloaltonetworks pan-os 10.2.10
paloaltonetworks pan-os 10.2.10
paloaltonetworks pan-os 10.2.11
paloaltonetworks pan-os 10.2.11
paloaltonetworks pan-os 10.2.11
paloaltonetworks pan-os 10.2.11
paloaltonetworks pan-os 10.2.11
paloaltonetworks pan-os 10.2.11
paloaltonetworks pan-os 10.2.11
paloaltonetworks pan-os 10.2.12
paloaltonetworks pan-os 10.2.12
paloaltonetworks pan-os 10.2.12
paloaltonetworks pan-os 10.2.12
paloaltonetworks pan-os 10.2.13
paloaltonetworks pan-os 10.2.13
paloaltonetworks pan-os 11.1.2
paloaltonetworks pan-os 11.1.2
paloaltonetworks pan-os 11.1.2
paloaltonetworks pan-os 11.1.2
paloaltonetworks pan-os 11.1.2
paloaltonetworks pan-os 11.1.2
paloaltonetworks pan-os 11.1.2
paloaltonetworks pan-os 11.1.2
paloaltonetworks pan-os 11.1.3
paloaltonetworks pan-os 11.1.3
paloaltonetworks pan-os 11.1.3
paloaltonetworks pan-os 11.1.3
paloaltonetworks pan-os 11.1.3
paloaltonetworks pan-os 11.1.3
paloaltonetworks pan-os 11.1.3
paloaltonetworks pan-os 11.1.4
paloaltonetworks pan-os 11.1.4
paloaltonetworks pan-os 11.1.4
paloaltonetworks prisma_access -
paloaltonetworks pan-os *
paloaltonetworks pan-os 10.2.8
paloaltonetworks pan-os 10.2.8
paloaltonetworks pan-os 10.2.8
paloaltonetworks pan-os 10.2.8
paloaltonetworks pan-os 10.2.8
paloaltonetworks pan-os 10.2.8
paloaltonetworks pan-os 10.2.8
paloaltonetworks pan-os 10.2.8
paloaltonetworks pan-os 10.2.9
paloaltonetworks pan-os 10.2.9
paloaltonetworks pan-os 10.2.9
paloaltonetworks pan-os 10.2.9
paloaltonetworks pan-os 10.2.9
paloaltonetworks pan-os 10.2.9
paloaltonetworks pan-os 10.2.9
paloaltonetworks pan-os 10.2.10
paloaltonetworks pan-os 10.2.10
paloaltonetworks pan-os 10.2.10
paloaltonetworks pan-os 10.2.10
paloaltonetworks pan-os 10.2.10
paloaltonetworks pan-os 10.2.10
paloaltonetworks pan-os 10.2.10
paloaltonetworks pan-os 10.2.10

{
  "cisaActionDue": "2025-01-20",
  "cisaExploitAdd": "2024-12-30",
  "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
  "cisaVulnerabilityName": "Palo Alto Networks PAN-OS Malicious DNS Packet Vulnerability",
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EAF9FD1F-1B8D-42A7-AB52-BA1F687C87BD",
              "versionEndIncluding": "11.1.1",
              "versionStartIncluding": "11.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABC296B2-C123-4767-83AE-81C29E9A8E93",
              "versionEndExcluding": "11.2.3",
              "versionStartIncluding": "11.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:-:*:*:*:*:*:*",
              "matchCriteriaId": "B41A7115-A370-49E1-B162-24803E6DD2CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h2:*:*:*:*:*:*",
              "matchCriteriaId": "65949A49-03A7-491C-B327-127F050AC4F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h4:*:*:*:*:*:*",
              "matchCriteriaId": "E8ACB147-B4C1-4964-B538-EAA117CC6DC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h6:*:*:*:*:*:*",
              "matchCriteriaId": "6643574D-C024-440C-9392-004B7FA4498F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:-:*:*:*:*:*:*",
              "matchCriteriaId": "5D64390F-F870-4DBF-B0FE-BCDFE58C8685",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h10:*:*:*:*:*:*",
              "matchCriteriaId": "F70FC9DF-10C9-4AE5-B64B-3153E2E4E9E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h13:*:*:*:*:*:*",
              "matchCriteriaId": "C3D6D552-6F33-496A-A505-5F59DF3B487B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h15:*:*:*:*:*:*",
              "matchCriteriaId": "D1ECD1DC-5A05-4E4F-97F5-136CE777FAB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h18:*:*:*:*:*:*",
              "matchCriteriaId": "347E5938-24FF-4C2C-B823-988D34706E24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h3:*:*:*:*:*:*",
              "matchCriteriaId": "CBA2B4FA-16C2-41B9-856D-EDC0CAF7A164",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h4:*:*:*:*:*:*",
              "matchCriteriaId": "E5E6A893-2994-40A3-AF35-8AF068B0DE42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:-:*:*:*:*:*:*",
              "matchCriteriaId": "D814F3A3-5E9D-426D-A654-1346D9ECE9B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h1:*:*:*:*:*:*",
              "matchCriteriaId": "8C7E9211-7041-4720-B4B9-3EA95D425263",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h11:*:*:*:*:*:*",
              "matchCriteriaId": "CEB258EE-2C6E-4A63-B04C-89C5F76B0878",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h14:*:*:*:*:*:*",
              "matchCriteriaId": "0F481B0E-2353-4AB0-8A98-B0EFBC409868",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h16:*:*:*:*:*:*",
              "matchCriteriaId": "3F7FC771-527F-4619-B785-6AE1F4722074",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h18:*:*:*:*:*:*",
              "matchCriteriaId": "CCC2A6DA-EB48-42CD-9234-A80C3F6AEFAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h9:*:*:*:*:*:*",
              "matchCriteriaId": "4E9EB9C6-78BA-4C66-A4BD-856BF27388CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:-:*:*:*:*:*:*",
              "matchCriteriaId": "03C5ABF2-8C53-4376-8A64-6CB34E18E77C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h10:*:*:*:*:*:*",
              "matchCriteriaId": "FF7FCD8B-80DF-4004-A9D2-4EE884F089A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h2:*:*:*:*:*:*",
              "matchCriteriaId": "872BC747-512A-4872-AC86-E7F1DC589F47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h3:*:*:*:*:*:*",
              "matchCriteriaId": "67F527D0-F85B-4B83-AEA5-BA636FC89210",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h4:*:*:*:*:*:*",
              "matchCriteriaId": "6CF8F985-7E51-49E6-857A-FAAF027F5611",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h5:*:*:*:*:*:*",
              "matchCriteriaId": "B437DCEA-ABA3-41CA-B320-97EC430F1122",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h7:*:*:*:*:*:*",
              "matchCriteriaId": "593AFE7A-CB37-4156-A2B8-646A317F3176",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h9:*:*:*:*:*:*",
              "matchCriteriaId": "A9F032C2-3202-479B-8C70-277F6871A4A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:-:*:*:*:*:*:*",
              "matchCriteriaId": "2B3D7DBA-C90C-451D-94C3-8B7066826308",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h1:*:*:*:*:*:*",
              "matchCriteriaId": "010F170D-438E-4A57-98B9-E7522FD95FC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h2:*:*:*:*:*:*",
              "matchCriteriaId": "AD8795BE-5CC2-443D-99AD-BD6985CADBA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h3:*:*:*:*:*:*",
              "matchCriteriaId": "F3D096D4-E60E-4D4C-9122-C36B775B4A6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h4:*:*:*:*:*:*",
              "matchCriteriaId": "FEE28628-E969-44FC-B577-066DB98BBDA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h6:*:*:*:*:*:*",
              "matchCriteriaId": "C69B22C4-6E7D-4F39-B86C-D408670CDC42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h9:*:*:*:*:*:*",
              "matchCriteriaId": "457824C9-4A39-4570-B697-F375AEF47A04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.12:-:*:*:*:*:*:*",
              "matchCriteriaId": "3D33A0FB-7538-42BF-84E8-7CCD7EEF9355",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.12:h1:*:*:*:*:*:*",
              "matchCriteriaId": "FB95D77F-1263-4D47-A0BB-94A6DA937115",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.12:h2:*:*:*:*:*:*",
              "matchCriteriaId": "8EA4C2A7-18CD-4232-B08C-99BEFE497A57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.12:h3:*:*:*:*:*:*",
              "matchCriteriaId": "357B747E-F960-4AA9-8696-B3BD89933630",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.13:-:*:*:*:*:*:*",
              "matchCriteriaId": "C2B871A6-0636-42A0-9573-6F693D7753AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.13:h1:*:*:*:*:*:*",
              "matchCriteriaId": "F1FC63B8-B8D9-4EC1-85CA-2E12B38ACD3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:-:*:*:*:*:*:*",
              "matchCriteriaId": "5F7627B3-A463-4570-BA23-663FEB7B4A8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h1:*:*:*:*:*:*",
              "matchCriteriaId": "275872C1-1EBB-4447-8C9F-347F757BFF42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h12:*:*:*:*:*:*",
              "matchCriteriaId": "F83E2987-F7B0-486C-8DC3-3C4A8B76F295",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h14:*:*:*:*:*:*",
              "matchCriteriaId": "5F6ACDFF-947E-4175-8A2A-8B43B86AA8B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h15:*:*:*:*:*:*",
              "matchCriteriaId": "6302E536-5B1A-45F6-996E-847F22C3C997",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h3:*:*:*:*:*:*",
              "matchCriteriaId": "4F36A8CA-4B15-4A88-BA51-2346506DE6E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h4:*:*:*:*:*:*",
              "matchCriteriaId": "F6CED1CC-D63C-4A10-9035-C461CA35E584",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h9:*:*:*:*:*:*",
              "matchCriteriaId": "BC83C63B-54C8-4667-8742-30A5477414B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:-:*:*:*:*:*:*",
              "matchCriteriaId": "D828F283-5CE8-49BA-BFEF-92471C2ADEAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h1:*:*:*:*:*:*",
              "matchCriteriaId": "86053616-71FB-4F6E-8B1E-97C2DA6C08A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h10:*:*:*:*:*:*",
              "matchCriteriaId": "0D1E3767-9517-4181-8355-DC0FB1139C95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h11:*:*:*:*:*:*",
              "matchCriteriaId": "A0E89D5D-3E2A-427C-90A9-2FE6123372DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h2:*:*:*:*:*:*",
              "matchCriteriaId": "9A3435A9-2100-4EB3-B20C-6A194A742BCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h4:*:*:*:*:*:*",
              "matchCriteriaId": "502BF06E-5B51-41F7-9A88-26051675FE0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:h6:*:*:*:*:*:*",
              "matchCriteriaId": "D953B45F-7F10-4087-AE3A-BD9AB977AF8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:-:*:*:*:*:*:*",
              "matchCriteriaId": "DF83EAA1-49E1-4AD0-A049-F1B3065950BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h1:*:*:*:*:*:*",
              "matchCriteriaId": "BE3F7369-9F35-409A-9F47-45A959592DFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h4:*:*:*:*:*:*",
              "matchCriteriaId": "E9DB4DA9-2262-4E9E-B3A1-49D261D01295",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:paloaltonetworks:prisma_access:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FFB6FBC7-DEEB-4571-BCF9-92345A4B614A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "44337774-F205-4121-ADEC-7D4AF7F9208C",
              "versionEndExcluding": "11.2.3",
              "versionStartIncluding": "10.2.11",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:-:*:*:*:*:*:*",
              "matchCriteriaId": "5D64390F-F870-4DBF-B0FE-BCDFE58C8685",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h10:*:*:*:*:*:*",
              "matchCriteriaId": "F70FC9DF-10C9-4AE5-B64B-3153E2E4E9E8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h13:*:*:*:*:*:*",
              "matchCriteriaId": "C3D6D552-6F33-496A-A505-5F59DF3B487B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h15:*:*:*:*:*:*",
              "matchCriteriaId": "D1ECD1DC-5A05-4E4F-97F5-136CE777FAB3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h18:*:*:*:*:*:*",
              "matchCriteriaId": "347E5938-24FF-4C2C-B823-988D34706E24",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h19:*:*:*:*:*:*",
              "matchCriteriaId": "C889402F-138A-45B9-BBCF-91FD18A0B810",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h3:*:*:*:*:*:*",
              "matchCriteriaId": "CBA2B4FA-16C2-41B9-856D-EDC0CAF7A164",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h4:*:*:*:*:*:*",
              "matchCriteriaId": "E5E6A893-2994-40A3-AF35-8AF068B0DE42",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:-:*:*:*:*:*:*",
              "matchCriteriaId": "D814F3A3-5E9D-426D-A654-1346D9ECE9B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h1:*:*:*:*:*:*",
              "matchCriteriaId": "8C7E9211-7041-4720-B4B9-3EA95D425263",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h11:*:*:*:*:*:*",
              "matchCriteriaId": "CEB258EE-2C6E-4A63-B04C-89C5F76B0878",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h14:*:*:*:*:*:*",
              "matchCriteriaId": "0F481B0E-2353-4AB0-8A98-B0EFBC409868",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h16:*:*:*:*:*:*",
              "matchCriteriaId": "3F7FC771-527F-4619-B785-6AE1F4722074",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h18:*:*:*:*:*:*",
              "matchCriteriaId": "CCC2A6DA-EB48-42CD-9234-A80C3F6AEFAE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h9:*:*:*:*:*:*",
              "matchCriteriaId": "4E9EB9C6-78BA-4C66-A4BD-856BF27388CE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:-:*:*:*:*:*:*",
              "matchCriteriaId": "03C5ABF2-8C53-4376-8A64-6CB34E18E77C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h10:*:*:*:*:*:*",
              "matchCriteriaId": "FF7FCD8B-80DF-4004-A9D2-4EE884F089A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h2:*:*:*:*:*:*",
              "matchCriteriaId": "872BC747-512A-4872-AC86-E7F1DC589F47",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h3:*:*:*:*:*:*",
              "matchCriteriaId": "67F527D0-F85B-4B83-AEA5-BA636FC89210",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h4:*:*:*:*:*:*",
              "matchCriteriaId": "6CF8F985-7E51-49E6-857A-FAAF027F5611",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h5:*:*:*:*:*:*",
              "matchCriteriaId": "B437DCEA-ABA3-41CA-B320-97EC430F1122",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h7:*:*:*:*:*:*",
              "matchCriteriaId": "593AFE7A-CB37-4156-A2B8-646A317F3176",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h9:*:*:*:*:*:*",
              "matchCriteriaId": "A9F032C2-3202-479B-8C70-277F6871A4A4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A Denial of Service vulnerability in the DNS Security feature of Palo Alto Networks PAN-OS software allows an unauthenticated attacker to send a malicious packet through the data plane of the firewall that reboots the firewall. Repeated attempts to trigger this condition will cause the firewall to enter maintenance mode."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad de DNS Security feature de Palo Alto Networks PAN-OS software permite que un atacante no autenticado env\u00ede un paquete malicioso a trav\u00e9s del plano de datos del firewall que reinicia el firewall. Los intentos repetidos de activar esta condici\u00f3n har\u00e1n que el firewall entre en modo de mantenimiento."
    }
  ],
  "id": "CVE-2024-3393",
  "lastModified": "2025-11-04T16:49:18.780",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ],
    "cvssMetricV40": [
      {
        "cvssData": {
          "Automatable": "NO",
          "Recovery": "USER",
          "Safety": "NOT_DEFINED",
          "attackComplexity": "LOW",
          "attackRequirements": "NONE",
          "attackVector": "NETWORK",
          "availabilityRequirement": "NOT_DEFINED",
          "baseScore": 8.7,
          "baseSeverity": "HIGH",
          "confidentialityRequirement": "NOT_DEFINED",
          "exploitMaturity": "NOT_DEFINED",
          "integrityRequirement": "NOT_DEFINED",
          "modifiedAttackComplexity": "NOT_DEFINED",
          "modifiedAttackRequirements": "NOT_DEFINED",
          "modifiedAttackVector": "NOT_DEFINED",
          "modifiedPrivilegesRequired": "NOT_DEFINED",
          "modifiedSubAvailabilityImpact": "NOT_DEFINED",
          "modifiedSubConfidentialityImpact": "NOT_DEFINED",
          "modifiedSubIntegrityImpact": "NOT_DEFINED",
          "modifiedUserInteraction": "NOT_DEFINED",
          "modifiedVulnAvailabilityImpact": "NOT_DEFINED",
          "modifiedVulnConfidentialityImpact": "NOT_DEFINED",
          "modifiedVulnIntegrityImpact": "NOT_DEFINED",
          "privilegesRequired": "NONE",
          "providerUrgency": "AMBER",
          "subAvailabilityImpact": "LOW",
          "subConfidentialityImpact": "NONE",
          "subIntegrityImpact": "NONE",
          "userInteraction": "NONE",
          "valueDensity": "CONCENTRATED",
          "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:U/V:C/RE:M/U:Amber",
          "version": "4.0",
          "vulnAvailabilityImpact": "HIGH",
          "vulnConfidentialityImpact": "NONE",
          "vulnIntegrityImpact": "NONE",
          "vulnerabilityResponseEffort": "MODERATE"
        },
        "source": "psirt@paloaltonetworks.com",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-12-27T10:15:17.270",
  "references": [
    {
      "source": "psirt@paloaltonetworks.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://security.paloaltonetworks.com/CVE-2024-3393"
    },
    {
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "tags": [
        "US Government Resource"
      ],
      "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-3393"
    }
  ],
  "sourceIdentifier": "psirt@paloaltonetworks.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-754"
        }
      ],
      "source": "psirt@paloaltonetworks.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-754"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…