Palo Alto Networks Zaps PAN-OS Bug Before It Zaps You!
Palo Alto Networks has patched a high-severity PAN-OS flaw (CVE-2024-3393) that could cause denial-of-service conditions. An unauthenticated attacker could reboot firewalls using a malicious packet. If your firewall starts acting like a drama queen and constantly rebooting, update to the latest PAN-OS version to keep the chaos at bay!

Hot Take:
If hackers were hoping to turn Palo Alto firewalls into their personal merry-go-rounds, they’re out of luck! Palo Alto Networks just pulled the emergency brake on this thrilling ride by patching a high-severity flaw in PAN-OS. So, if you were planning to reboot your firewalls using a packet of doom, you might want to rethink your life choices.
Key Points:
- Palo Alto Networks fixed a high-severity flaw in PAN-OS affecting versions 10.X and 11.X.
- The flaw, CVE-2024-3393, could lead to a denial-of-service (DoS) condition via malicious packet exploitation.
- To exploit this vulnerability, DNS Security logging must be enabled.
- The issue is resolved in updated versions of PAN-OS: 10.1.14-h8, 10.2.10-h12, 11.1.5, and 11.2.3.
- PAN-OS 11.0 will not receive a fix as it has reached its end of life.
Already a member? Log in here