Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 20, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 20, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 20, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 20, 2025

      GPT-5 should have a higher “degree of scientific certainty” than the current ChatGPT — but with less model switching

      May 20, 2025

      Elon Musk’s Grok 3 AI coming to Azure proves Satya Nadella’s allegiance isn’t to OpenAI, but to maximizing Microsoft’s profit gains by heeding consumer demands

      May 20, 2025

      One of the most promising open-world RPGs in years is releasing next week on Xbox and PC

      May 20, 2025

      NVIDIA’s latest driver fixes some big issues with DOOM: The Dark Ages

      May 20, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Community News: Latest PECL Releases (05.20.2025)

      May 20, 2025
      Recent

      Community News: Latest PECL Releases (05.20.2025)

      May 20, 2025

      Getting Started with Personalization in Sitecore XM Cloud: Enable, Extend, and Execute

      May 20, 2025

      Universal Design and Global Accessibility Awareness Day (GAAD)

      May 20, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      GPT-5 should have a higher “degree of scientific certainty” than the current ChatGPT — but with less model switching

      May 20, 2025
      Recent

      GPT-5 should have a higher “degree of scientific certainty” than the current ChatGPT — but with less model switching

      May 20, 2025

      Elon Musk’s Grok 3 AI coming to Azure proves Satya Nadella’s allegiance isn’t to OpenAI, but to maximizing Microsoft’s profit gains by heeding consumer demands

      May 20, 2025

      One of the most promising open-world RPGs in years is releasing next week on Xbox and PC

      May 20, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Critical PAN-OS Vulnerability Added to CISA’s Exploited List: What You Need to Know

    Critical PAN-OS Vulnerability Added to CISA’s Exploited List: What You Need to Know

    January 2, 2025

    PAN-OS Versions

    The Cybersecurity and Infrastructure Security Agency (CISA) has expanded its Known Exploited Vulnerabilities (KEV) Catalog by adding a newly discovered vulnerability in Palo Alto Networks’ PAN-OS versions. This addition reflects evidence of active exploitation, marking it as a critical risk to federal enterprises and beyond.

    The vulnerability, identified as CVE-2024-3393, is classified as a Denial of Service (DoS) issue in the DNS Security feature of PAN-OS. This flaw could allow unauthenticated attackers to disrupt firewall operations, causing them to reboot repeatedly and potentially enter maintenance mode if the attack is sustained.

    What Is the Vulnerability?

    The vulnerability lies in the way PAN-OS processes malformed DNS packets. When a maliciously crafted packet is sent through the firewall’s data plane, it triggers a failure that forces the system to reboot. Repeated exploitation could render the firewall non-functional, thereby compromising network security.

    The issue is particularly concerning for organizations using PA-Series, VM-Series, CN-Series firewalls, or Prisma Access solutions. This vulnerability affects specific versions of PAN-OS with DNS Security or Advanced DNS Security licenses enabled and DNS Security logging turned on.

    Affected PAN-OS Versions

    The vulnerability affects:

    • PAN-OS 11.2: Versions below 11.2.3
    • PAN-OS 11.1: Versions below 11.1.5
    • PAN-OS 10.2: Versions between 10.2.8 and 10.2.14
    • PAN-OS 10.1: Versions between 10.1.14 and 10.1.15

    However, older PAN-OS versions such as 9.1 and 10.0, as well as Panorama M-Series and Panorama virtual appliances, remain unaffected.

    Severity and Exploitation Status

    This vulnerability is rated as High Severity, with a CVSS score of 8.7 for unauthenticated scenarios. The attack requires no user interaction, making it particularly dangerous in environments where network firewalls process untrusted DNS packets.

    Palo Alto Networks has confirmed cases of active exploitation, where customers reported firewall disruptions caused by malicious DNS packets triggering the vulnerability.

    Mitigation Measures

    While Palo Alto Networks has released patches to address the issue, organizations that cannot immediately upgrade can apply the following workarounds:

    1. Security Profile Adjustments: Clone predefined Anti-Spyware profiles (e.g., “Default” or “Strict”) in the Security Policy and replace them with custom profiles.
    2. Tuning DNS Security Settings: Disable DNS Security logging temporarily if operationally feasible.
    3. Regular Monitoring: Continuously monitor for unusual firewall behavior, such as unexpected reboots.

    These measures provide interim protection until a permanent fix is implemented.

    Permanent Fixes Available

    To fully mitigate the vulnerability, affected systems should upgrade to the following PAN-OS versions:

    • PAN-OS 11.2.3 or later
    • PAN-OS 11.1.5 or later
    • PAN-OS 10.2.14 or later (ETA: January 2025)
    • PAN-OS 10.1.15 or later (ETA: January 2025)

    Palo Alto Networks has also released fixes for specific maintenance releases of PAN-OS to accommodate different deployment needs.

    Understanding the Technical Impact

    This DoS vulnerability compromises system availability by crashing or restarting the firewall. Improper exception handling and insufficient validation of DNS packets contribute to the flaw, categorized under:

    • CWE-754: Improper Check for Unusual or Exceptional Conditions
    • CAPEC-540: Overread Buffers

    The consequences of this vulnerability extend beyond simple reboots. Attackers exploiting it could gain insights into system behavior, potentially refining their attacks to target other weaknesses.

    How Organizations Can Protect Themselves

    To address this vulnerability, organizations should consider both technical and procedural defenses:

    • Upgrade Immediately: Ensure systems are running fixed PAN-OS versions.
    • Enhance Error Handling: Developers should adopt exception-handling mechanisms to prevent cascading failures.
    • Validate Inputs: Implement strict input validation to minimize the risk of processing malformed packets.
    • Monitor Logs: Regularly audit log files for suspicious activity while ensuring sensitive details are not exposed.
    • Fail Gracefully: Design systems to handle failures without exposing internal states to attackers.

    Broader Implications

    This vulnerability highlights the ongoing challenge of securing critical systems against sophisticated cyber threats. Attackers often exploit flaws in widely used technologies like PAN-OS, targeting organizations that rely heavily on them for network defense.

    For federal enterprises, the risks are even higher due to the sensitive nature of their operations. CISA’s proactive inclusion of such vulnerabilities in its KEV Catalog highlights the need for timely updates and vigilant security practices.

    Closing Thoughts

    Organizations using Palo Alto Networks’ solutions must act swiftly to mitigate this vulnerability, whether by applying patches or deploying workarounds.

    By adopting strong security practices and staying informed about emerging threats, businesses can better protect their networks and maintain operational resilience in the face of increasing cyber risks.

    Source: Read More

    Hostinger
    Facebook Twitter Reddit Email Copy Link
    Previous ArticleCERT-In Alerts WordPress Users to Critical WPForms Plugin Vulnerability
    Next Article The AI Fix #31: Replay: AI doesn’t exist

    Related Posts

    Security

    Nmap 7.96 Launches with Lightning-Fast DNS and 612 Scripts

    May 20, 2025
    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-30193 – DNSdist TCP Stack Exhaustion Denial of Service Vulnerability

    May 20, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    There’s no such thing as UI-less anything.

    Web Development

    AI Video Generator Online – Free and Secure Online Video AI

    Web Development

    Comparative Evaluation of SAM2 and SAM1 for 2D and 3D Medical Image Segmentation: Performance Insights and Transfer Learning Potential

    Development

    CVE-2025-4724 – iSourcecode Placement Management System SQL Injection Vulnerability

    Common Vulnerabilities and Exposures (CVEs)
    Hostinger

    Highlights

    5 Tips for Improving Your Team’s Productivity (Free Download)

    July 8, 2024

    Keeping team members motivated and performing at the top of their game is difficult. If…

    JMeter- multiple user login and extract the user id and password without using csv file

    May 22, 2024

    What is Project Strawberry? OpenAI’s mystery AI tool explained

    August 8, 2024

    You can restore WordPad in Windows 11 24H2

    June 23, 2024
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.