Palo Alto Networks Zaps PAN-OS Bug Before It Zaps You!

Palo Alto Networks has patched a high-severity PAN-OS flaw (CVE-2024-3393) that could cause denial-of-service conditions. An unauthenticated attacker could reboot firewalls using a malicious packet. If your firewall starts acting like a drama queen and constantly rebooting, update to the latest PAN-OS version to keep the chaos at bay!

Pro Dashboard

Hot Take:

If hackers were hoping to turn Palo Alto firewalls into their personal merry-go-rounds, they’re out of luck! Palo Alto Networks just pulled the emergency brake on this thrilling ride by patching a high-severity flaw in PAN-OS. So, if you were planning to reboot your firewalls using a packet of doom, you might want to rethink your life choices.

Key Points:

  • Palo Alto Networks fixed a high-severity flaw in PAN-OS affecting versions 10.X and 11.X.
  • The flaw, CVE-2024-3393, could lead to a denial-of-service (DoS) condition via malicious packet exploitation.
  • To exploit this vulnerability, DNS Security logging must be enabled.
  • The issue is resolved in updated versions of PAN-OS: 10.1.14-h8, 10.2.10-h12, 11.1.5, and 11.2.3.
  • PAN-OS 11.0 will not receive a fix as it has reached its end of life.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?