Hackers Give Palo Alto Firewalls a Reboot Rinse and Repeat!
Hackers are having a field day exploiting the CVE-2024-3393 denial of service vulnerability, turning Palo Alto Networks firewalls into reboot enthusiasts. The flaw, which requires manual intervention for repairs, has been patched in newer PAN-OS versions. However, devices running PAN-OS 11.0 are out of luck as it’s reached the end-of-life date.

Hot Take:
Who knew firewalls had a soft spot for malicious packets? It’s like an Achilles’ heel for the digital age, where the mighty firewall gets a reboot nudge from a sneaky hacker with a bad attitude. Thanks to this CVE-2024-3393 vulnerability, firewalls are having more meltdowns than a toddler denied dessert. Kudos to Palo Alto Networks for stepping in as the tech-savvy babysitter to calm the chaos!
Key Points:
- Palo Alto Networks warns of a CVE-2024-3393 vulnerability causing firewall reboots.
- The vulnerability is actively exploited by unauthenticated attackers using malicious packets.
- Only affects devices with ‘DNS Security’ logging enabled.
- Patches available for most PAN-OS versions, except PAN-OS 11.0 which is EOL.
- Palo Alto provided workarounds for those unable to update immediately.
Already a member? Log in here