CVE-2024-3385

A packet processing mechanism in Palo Alto Networks PAN-OS software enables a remote attacker to reboot hardware-based firewalls. Repeated attacks eventually cause the firewall to enter maintenance mode, which requires manual intervention to bring the firewall back online. This affects the following hardware firewall models: - PA-5400 Series firewalls - PA-7000 Series firewalls
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*
cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*
cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*
cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*
cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*
cpe:2.3:o:paloaltonetworks:pan-os:9.0.17:-:*:*:*:*:*:*
cpe:2.3:o:paloaltonetworks:pan-os:9.0.17:h1:*:*:*:*:*:*
OR cpe:2.3:h:paloaltonetworks:pa-5410:-:*:*:*:*:*:*:*
cpe:2.3:h:paloaltonetworks:pa-5420:-:*:*:*:*:*:*:*
cpe:2.3:h:paloaltonetworks:pa-5430:-:*:*:*:*:*:*:*
cpe:2.3:h:paloaltonetworks:pa-5440:-:*:*:*:*:*:*:*
cpe:2.3:h:paloaltonetworks:pa-5445:-:*:*:*:*:*:*:*
cpe:2.3:h:paloaltonetworks:pa-7050:-:*:*:*:*:*:*:*
cpe:2.3:h:paloaltonetworks:pa-7080:-:*:*:*:*:*:*:*

History

24 Jan 2025, 15:55

Type Values Removed Values Added
First Time Paloaltonetworks pa-5430
Paloaltonetworks pa-7050
Paloaltonetworks
Paloaltonetworks pa-5410
Paloaltonetworks pa-5440
Paloaltonetworks pa-7080
Paloaltonetworks pa-5445
Paloaltonetworks pan-os
Paloaltonetworks pa-5420
CPE cpe:2.3:o:paloaltonetworks:pan-os:9.0.17:-:*:*:*:*:*:*
cpe:2.3:o:paloaltonetworks:pan-os:9.0.17:h1:*:*:*:*:*:*
cpe:2.3:h:paloaltonetworks:pa-5430:-:*:*:*:*:*:*:*
cpe:2.3:h:paloaltonetworks:pa-5410:-:*:*:*:*:*:*:*
cpe:2.3:h:paloaltonetworks:pa-7080:-:*:*:*:*:*:*:*
cpe:2.3:h:paloaltonetworks:pa-5420:-:*:*:*:*:*:*:*
cpe:2.3:h:paloaltonetworks:pa-5440:-:*:*:*:*:*:*:*
cpe:2.3:h:paloaltonetworks:pa-7050:-:*:*:*:*:*:*:*
cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*
cpe:2.3:h:paloaltonetworks:pa-5445:-:*:*:*:*:*:*:*
References () https://security.paloaltonetworks.com/CVE-2024-3385 - () https://security.paloaltonetworks.com/CVE-2024-3385 - Vendor Advisory

21 Nov 2024, 09:29

Type Values Removed Values Added
References () https://security.paloaltonetworks.com/CVE-2024-3385 - () https://security.paloaltonetworks.com/CVE-2024-3385 -
Summary
  • (es) Un mecanismo de procesamiento de paquetes en el software PAN-OS de Palo Alto Networks permite a un atacante remoto reiniciar los firewalls basados en hardware. Los ataques repetidos eventualmente hacen que el firewall entre en modo de mantenimiento, lo que requiere una intervención manual para volver a ponerlo en línea. Esto afecta a los siguientes modelos de firewall de hardware: - Firewalls de la serie PA-5400 - Firewalls de la serie PA-7000

10 Apr 2024, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-10 17:15

Updated : 2025-01-24 15:55


NVD link : CVE-2024-3385

Mitre link : CVE-2024-3385

CVE.ORG link : CVE-2024-3385


JSON object : View

Products Affected

paloaltonetworks

  • pa-5445
  • pa-7080
  • pan-os
  • pa-5420
  • pa-5410
  • pa-7050
  • pa-5430
  • pa-5440
CWE
CWE-20

Improper Input Validation

CWE-476

NULL Pointer Dereference