Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 20, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 20, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 20, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 20, 2025

      GPT-5 should have a higher “degree of scientific certainty” than the current ChatGPT — but with less model switching

      May 20, 2025

      Elon Musk’s Grok 3 AI coming to Azure proves Satya Nadella’s allegiance isn’t to OpenAI, but to maximizing Microsoft’s profit gains by heeding consumer demands

      May 20, 2025

      One of the most promising open-world RPGs in years is releasing next week on Xbox and PC

      May 20, 2025

      NVIDIA’s latest driver fixes some big issues with DOOM: The Dark Ages

      May 20, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Community News: Latest PECL Releases (05.20.2025)

      May 20, 2025
      Recent

      Community News: Latest PECL Releases (05.20.2025)

      May 20, 2025

      Getting Started with Personalization in Sitecore XM Cloud: Enable, Extend, and Execute

      May 20, 2025

      Universal Design and Global Accessibility Awareness Day (GAAD)

      May 20, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      GPT-5 should have a higher “degree of scientific certainty” than the current ChatGPT — but with less model switching

      May 20, 2025
      Recent

      GPT-5 should have a higher “degree of scientific certainty” than the current ChatGPT — but with less model switching

      May 20, 2025

      Elon Musk’s Grok 3 AI coming to Azure proves Satya Nadella’s allegiance isn’t to OpenAI, but to maximizing Microsoft’s profit gains by heeding consumer demands

      May 20, 2025

      One of the most promising open-world RPGs in years is releasing next week on Xbox and PC

      May 20, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Critical PAN-OS Vulnerability Added to CISA’s Exploited List: What You Need to Know

    Critical PAN-OS Vulnerability Added to CISA’s Exploited List: What You Need to Know

    January 2, 2025

    PAN-OS Versions

    The Cybersecurity and Infrastructure Security Agency (CISA) has expanded its Known Exploited Vulnerabilities (KEV) Catalog by adding a newly discovered vulnerability in Palo Alto Networks’ PAN-OS versions. This addition reflects evidence of active exploitation, marking it as a critical risk to federal enterprises and beyond.

    The vulnerability, identified as CVE-2024-3393, is classified as a Denial of Service (DoS) issue in the DNS Security feature of PAN-OS. This flaw could allow unauthenticated attackers to disrupt firewall operations, causing them to reboot repeatedly and potentially enter maintenance mode if the attack is sustained.

    What Is the Vulnerability?

    The vulnerability lies in the way PAN-OS processes malformed DNS packets. When a maliciously crafted packet is sent through the firewall’s data plane, it triggers a failure that forces the system to reboot. Repeated exploitation could render the firewall non-functional, thereby compromising network security.

    The issue is particularly concerning for organizations using PA-Series, VM-Series, CN-Series firewalls, or Prisma Access solutions. This vulnerability affects specific versions of PAN-OS with DNS Security or Advanced DNS Security licenses enabled and DNS Security logging turned on.

    Affected PAN-OS Versions

    The vulnerability affects:

    • PAN-OS 11.2: Versions below 11.2.3
    • PAN-OS 11.1: Versions below 11.1.5
    • PAN-OS 10.2: Versions between 10.2.8 and 10.2.14
    • PAN-OS 10.1: Versions between 10.1.14 and 10.1.15

    However, older PAN-OS versions such as 9.1 and 10.0, as well as Panorama M-Series and Panorama virtual appliances, remain unaffected.

    Severity and Exploitation Status

    This vulnerability is rated as High Severity, with a CVSS score of 8.7 for unauthenticated scenarios. The attack requires no user interaction, making it particularly dangerous in environments where network firewalls process untrusted DNS packets.

    Palo Alto Networks has confirmed cases of active exploitation, where customers reported firewall disruptions caused by malicious DNS packets triggering the vulnerability.

    Mitigation Measures

    While Palo Alto Networks has released patches to address the issue, organizations that cannot immediately upgrade can apply the following workarounds:

    1. Security Profile Adjustments: Clone predefined Anti-Spyware profiles (e.g., “Default” or “Strict”) in the Security Policy and replace them with custom profiles.
    2. Tuning DNS Security Settings: Disable DNS Security logging temporarily if operationally feasible.
    3. Regular Monitoring: Continuously monitor for unusual firewall behavior, such as unexpected reboots.

    These measures provide interim protection until a permanent fix is implemented.

    Permanent Fixes Available

    To fully mitigate the vulnerability, affected systems should upgrade to the following PAN-OS versions:

    • PAN-OS 11.2.3 or later
    • PAN-OS 11.1.5 or later
    • PAN-OS 10.2.14 or later (ETA: January 2025)
    • PAN-OS 10.1.15 or later (ETA: January 2025)

    Palo Alto Networks has also released fixes for specific maintenance releases of PAN-OS to accommodate different deployment needs.

    Understanding the Technical Impact

    This DoS vulnerability compromises system availability by crashing or restarting the firewall. Improper exception handling and insufficient validation of DNS packets contribute to the flaw, categorized under:

    • CWE-754: Improper Check for Unusual or Exceptional Conditions
    • CAPEC-540: Overread Buffers

    The consequences of this vulnerability extend beyond simple reboots. Attackers exploiting it could gain insights into system behavior, potentially refining their attacks to target other weaknesses.

    How Organizations Can Protect Themselves

    To address this vulnerability, organizations should consider both technical and procedural defenses:

    • Upgrade Immediately: Ensure systems are running fixed PAN-OS versions.
    • Enhance Error Handling: Developers should adopt exception-handling mechanisms to prevent cascading failures.
    • Validate Inputs: Implement strict input validation to minimize the risk of processing malformed packets.
    • Monitor Logs: Regularly audit log files for suspicious activity while ensuring sensitive details are not exposed.
    • Fail Gracefully: Design systems to handle failures without exposing internal states to attackers.

    Broader Implications

    This vulnerability highlights the ongoing challenge of securing critical systems against sophisticated cyber threats. Attackers often exploit flaws in widely used technologies like PAN-OS, targeting organizations that rely heavily on them for network defense.

    For federal enterprises, the risks are even higher due to the sensitive nature of their operations. CISA’s proactive inclusion of such vulnerabilities in its KEV Catalog highlights the need for timely updates and vigilant security practices.

    Closing Thoughts

    Organizations using Palo Alto Networks’ solutions must act swiftly to mitigate this vulnerability, whether by applying patches or deploying workarounds.

    By adopting strong security practices and staying informed about emerging threats, businesses can better protect their networks and maintain operational resilience in the face of increasing cyber risks.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleCERT-In Alerts WordPress Users to Critical WPForms Plugin Vulnerability
    Next Article The AI Fix #31: Replay: AI doesn’t exist

    Related Posts

    Security

    Nmap 7.96 Launches with Lightning-Fast DNS and 612 Scripts

    May 20, 2025
    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-4996 – Intelbras RF 301K Cross-Site Scripting Vulnerability

    May 20, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    I used Copilot AI Vision to browse the web for me, and it has big potential

    Development

    Going (for) broke: 6 common online betting scams and how to avoid them

    Development

    Why I recommend this Android phone for kids over a cheap Samsung or Motorola model

    Development

    South of Midnight release date and launch times confirmed: Preload now and see when early access is available in your region

    News & Updates

    Highlights

    N|Solid 6.1.8: Major AI Upgrades, UX Enhancements, and Tracing Improvements

    May 5, 2025

    our latest release bringing an exciting wave of new features, critical improvements, and behind-the-scenes optimizations.…

    Data Warehouse Solutions Insights: Engineering and Analytics

    August 5, 2024

    Addressing Sycophancy in AI: Challenges and Insights from Human Feedback Training

    June 1, 2024

    How Salesforce’s 5-level framework for AI agents finally cuts through the hype

    April 10, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.