A packet processing mechanism in Palo Alto Networks PAN-OS software enables a remote attacker to reboot hardware-based firewalls. Repeated attacks eventually cause the firewall to enter maintenance mode, which requires manual intervention to bring the firewall back online.
This affects the following hardware firewall models:
- PA-5400 Series firewalls
- PA-7000 Series firewalls
References
Link | Resource |
---|---|
https://security.paloaltonetworks.com/CVE-2024-3385 | Vendor Advisory |
https://security.paloaltonetworks.com/CVE-2024-3385 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
24 Jan 2025, 15:55
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:h:paloaltonetworks:pa-7080:-:*:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:9.0.17:-:*:*:*:*:*:* cpe:2.3:h:paloaltonetworks:pa-5445:-:*:*:*:*:*:*:* cpe:2.3:h:paloaltonetworks:pa-7050:-:*:*:*:*:*:*:* cpe:2.3:h:paloaltonetworks:pa-5430:-:*:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:* cpe:2.3:h:paloaltonetworks:pa-5440:-:*:*:*:*:*:*:* cpe:2.3:h:paloaltonetworks:pa-5410:-:*:*:*:*:*:*:* cpe:2.3:h:paloaltonetworks:pa-5420:-:*:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:9.0.17:h1:*:*:*:*:*:* |
|
First Time |
Paloaltonetworks pa-5440
Paloaltonetworks pa-5410 Paloaltonetworks pa-5430 Paloaltonetworks pa-7080 Paloaltonetworks pa-5420 Paloaltonetworks pan-os Paloaltonetworks pa-7050 Paloaltonetworks Paloaltonetworks pa-5445 |
|
References | () https://security.paloaltonetworks.com/CVE-2024-3385 - Vendor Advisory |
Information
Published : 2024-04-10 17:15
Updated : 2025-01-24 15:55
NVD link : CVE-2024-3385
Mitre link : CVE-2024-3385
CVE.ORG link : CVE-2024-3385
JSON object : View
Products Affected
paloaltonetworks
- pa-7050
- pa-5445
- pa-5440
- pan-os
- pa-5430
- pa-5420
- pa-7080
- pa-5410