CVE-2024-3385

high

Description

A packet processing mechanism in Palo Alto Networks PAN-OS software enables a remote attacker to reboot hardware-based firewalls. Repeated attacks eventually cause the firewall to enter maintenance mode, which requires manual intervention to bring the firewall back online. This affects the following hardware firewall models: - PA-5400 Series firewalls - PA-7000 Series firewalls

References

https://securityaffairs.com/161724/security/palo-alto-networks-pan-os-dos-2.html?web_view=true

https://securityaffairs.com/161724/security/palo-alto-networks-pan-os-dos-2.html

https://www.securityweek.com/palo-alto-networks-patches-vulnerabilities-allowing-firewall-disruption/

https://security.paloaltonetworks.com/CVE-2024-3385

Details

Source: Mitre, NVD

Published: 2024-04-10

Updated: 2024-04-10

Risk Information

CVSS v2

Base Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

Severity: High

CVSS v3

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Severity: High