Article Details
Scrape Timestamp (UTC): 2024-12-27 07:39:07.644
Source: https://thehackernews.com/2024/12/palo-alto-releases-patch-for-pan-os-dos.html
Original Article Text
Click to Toggle View
Palo Alto Releases Patch for PAN-OS DoS Flaw — Update Immediately. Palo Alto Networks has disclosed a high-severity vulnerability impacting PAN-OS software that could cause a denial-of-service (DoS) condition on susceptible devices. The flaw, tracked as CVE-2024-3393 (CVSS score: 8.7), impacts PAN-OS versions 10.X and 11.X, as well as Prisma Access running PAN-OS versions. It has been addressed in PAN-OS 10.1.14-h8, PAN-OS 10.2.10-h12, PAN-OS 11.1.5, PAN-OS 11.2.3, and all later PAN-OS versions. "A denial-of-service vulnerability in the DNS Security feature of Palo Alto Networks PAN-OS software allows an unauthenticated attacker to send a malicious packet through the data plane of the firewall that reboots the firewall," the company said in a Friday advisory. "Repeated attempts to trigger this condition will cause the firewall to enter maintenance mode." Palo Alto Networks said it discovered the flaw in production use, and that it's aware of customers "experiencing this denial-of-service (DoS) when their firewall blocks malicious DNS packets that trigger this issue." The extent of the activity is presently unknown. The Hacker News has reached out to Palo Alto Networks for further comment, and we will update the story if we hear back. It's worth pointing out that firewalls that have the DNS Security logging enabled are affected by CVE-2024-3393. The severity of the flaw also drops to a CVSS score of 7.1 when access is only provided to authenticated end users via Prisma Access. The fixes have also been extended to other commonly deployed maintenance releases - As workarounds and mitigations for unmanaged firewalls or those managed by Panorama, customers have the option of setting Log Severity to "none" for all configured DNS Security categories for each Anti-Spyware profile by navigating to Objects > Security Profiles > Anti-spyware > (select a profile) > DNS Policies > DNS Security. For firewalls managed by Strata Cloud Manager (SCM), users can either follow the above steps to disable DNS Security logging directly on each device, or across all of them by opening a support case. For Prisma Access tenants managed by SCM, it's recommended to open a support case to turn off logging until an upgrade is carried out.
Daily Brief Summary
Palo Alto Networks has released patches to address a critical denial-of-service (DoS) vulnerability in PAN-OS, affecting versions 10.X and 11.X.
The vulnerability, designated CVE-2024-3393 with a CVSS score of 8.7, exploits the DNS Security feature, allowing unauthenticated attackers to send malicious packets that reboot the firewall.
Impact extends to devices running PAN-OS in default configurations with DNS Security logging enabled, affecting firewall stability and network security.
Fixes are available in PAN-OS versions 10.1.14-h8, 10.2.10-h12, 11.1.5, and 11.2.3, along with recommendations to upgrade immediately to mitigate risks.
As a temporary measure, Palo Alto advises customers to set DNS Security log severity to "none" for firewalls not yet upgraded or managed by Panorama and Strata Cloud Manager.
Palo Alto Networks identified the issue during production use after incidents where firewalls entered maintenance mode following repeated malicious DNS packet blocks.