Palo Alto Networks PAN-OS 7.1.1 Out-of-Sequence Packet Firewall Bypass
Medium Nessus Plugin ID 91675
SynopsisThe remote host is affected by a firewall bypass vulnerability.
DescriptionThe version of Palo Alto Networks PAN-OS running on the remote host is 7.1.1. It is, therefore, affected by an unspecified flaw when handling out-of-sequence packets. An unauthenticated, remote attacker can exploit this to bypass the firewall.
SolutionUpgrade to Palo Alto Networks PAN-OS version 7.1.2 or later.