CVE-2024-3393
PAN-OS: Firewall Denial of Service (DoS) in DNS Security Using a Specially Crafted Packet
Basic Information
- CVE State
- PUBLISHED
- Reserved Date
- April 05, 2024
- Published Date
- December 27, 2024
- Last Updated
- December 30, 2024
- Vendor
- Palo Alto Networks
- Product
- Cloud NGFW, PAN-OS
- Description
- A Denial of Service vulnerability in the DNS Security feature of Palo Alto Networks PAN-OS software allows an unauthenticated attacker to send a malicious packet through the data plane of the firewall that reboots the firewall. Repeated attempts to trigger this condition will cause the firewall to enter maintenance mode.
- Tags
- Exploitation
- active
- Automatable
- Yes
- Technical Impact
- partial
cisa
edge
nessus_scanner
CVSS Scores
CVSS v4.0
8.7 - HIGH
Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/AU:N/R:U/V:C/RE:M/U:Amber
SSVC Information
Known Exploited Vulnerability Information
Source | Added Date |
---|---|
CISA | 2024-12-30 00:00:00 UTC |
Scanner Integrations
Scanner | URL | Date Detected |
---|---|---|
Nessus | https://www.tenable.com/plugins/nessus/213409 | 2024-12-27 09:01:00 UTC |
Potential Proof of Concepts
Warning: These PoCs have not been tested and could contain malware. Use at your own risk.
FelixFoxf/-CVE-2024-3393
Type: github • Created: 2025-01-04 08:18:06 UTC • Stars: 5
CVE-2024-3393 EXPLOIT
Timeline
-
CVE ID Reserved
-
Detected by Nessus
-
CVE Published to Public
-
Added to KEVIntel
-
Proof of Concept Exploit Available