A vulnerability in Palo Alto Networks PAN-OS software enables a remote attacker to reboot PAN-OS firewalls when receiving Windows New Technology LAN Manager (NTLM) packets from Windows servers. Repeated attacks eventually cause the firewall to enter maintenance mode, which requires manual intervention to bring the firewall back online.
References
Link | Resource |
---|---|
https://security.paloaltonetworks.com/CVE-2024-3384 | Vendor Advisory |
https://security.paloaltonetworks.com/CVE-2024-3384 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
24 Jan 2025, 15:54
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-Other | |
First Time |
Paloaltonetworks pan-os
Paloaltonetworks |
|
CPE | cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:9.1.15:-:*:*:*:*:*:* |
|
References | () https://security.paloaltonetworks.com/CVE-2024-3384 - Vendor Advisory |
21 Nov 2024, 09:29
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://security.paloaltonetworks.com/CVE-2024-3384 - |
10 Apr 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-04-10 17:15
Updated : 2025-01-24 15:54
NVD link : CVE-2024-3384
Mitre link : CVE-2024-3384
CVE.ORG link : CVE-2024-3384
JSON object : View
Products Affected
paloaltonetworks
- pan-os
CWE