HomeCyber BalkansPalo Alto Networks Vulnerability Exposes Firewalls to DoS Attacks

Palo Alto Networks Vulnerability Exposes Firewalls to DoS Attacks

Published on

spot_img

A critical vulnerability, identified as CVE-2024-3393, has been discovered within the DNS Security feature of Palo Alto Networks’ PAN-OS software. This flaw allows unauthenticated attackers to exploit firewalls by sending specially crafted packets, resulting in denial-of-service (DoS) conditions.

The issue has been actively exploited, prompting urgent mitigation measures to be taken by organizations utilizing Palo Alto Networks’ firewalls. Experts have warned that this vulnerability poses a significant risk to system availability and can have severe consequences if not addressed promptly.

The vulnerability arises from improper handling of malicious DNS packets within the data plane of affected firewalls. Attackers can exploit this flaw by sending a specific type of packet that forces the firewall to reboot. With repeated exploitation, the firewall can be pushed into maintenance mode, rendering it non-operational. This high-severity issue has been assigned a CVSS score of 8.7, underlining its critical impact on system availability.

Key characteristics of the vulnerability include a network-based attack vector, low attack complexity, and the absence of privileges or user interaction required for exploitation. The flaw affects certain versions of PAN-OS, specifically versions below 11.2.3, 11.1.5, and select maintenance releases of 10.1 and 10.2.

The vulnerability has already been observed in production environments where DNS Security logging is enabled. Its exploitation can lead to significant service disruptions, especially for organizations that heavily rely on Palo Alto Networks’ firewalls for essential network security operations. While confidentiality and integrity remain unaffected, the availability of systems is severely compromised, as confirmed by reports of DoS attacks triggered by this issue.

The weakness has been categorized under CWE-754 (Improper Check for Unusual or Exceptional Conditions) and CAPEC-540 (Overread Buffers), highlighting the nature of the vulnerability and its potential impact on affected systems.

To address the vulnerability, Palo Alto Networks has released patches for various PAN-OS versions, including 11.2.3, 11.1.5, 10.2.10-h12, 10.2.13-h2, and 10.1.14-h8. For Prisma Access customers, upgrades will be rolled out in phases on January 3rd and January 10th, 2025, with the option for expedited upgrades through support cases. In the meantime, administrators can disable DNS Security logging as a temporary workaround by adjusting Anti-spyware profiles.

Organizations are strongly advised to update affected systems promptly or implement recommended mitigations to prevent service disruptions caused by this critical vulnerability. Proactive measures should be taken to safeguard network security and maintain system availability in the face of potential threats exploiting this flaw.

In conclusion, the discovery of vulnerability CVE-2024-3393 within Palo Alto Networks’ PAN-OS software serves as a reminder of the ongoing risks and challenges faced in the ever-evolving landscape of cybersecurity. By promptly addressing this issue and implementing necessary safeguards, organizations can enhance their resilience against potential threats and ensure the continuous operation of critical network infrastructure.

Source link

Latest articles

Pro-Russian hackers target Italian airport websites – DW – 12/28/2024

Russian hackers were reported to have launched a cyberattack on the websites of Milan's...

North Korea actors utilize OtterCookie malware in Contagious Interview campaign – Source: securityaffairs.com

North Korea-linked threat actors have been identified using a new malware strain known as...

Live Webinar: Revealing North Korea’s Secret IT Army and Strategies for Combatting it

In a recent live webinar hosted by cybersecurity experts, the focus was on North...

LockBit and ALPHV’s takedowns drive RansomHub’s growth on The Register

RansomHub, a notorious ransomware collective that emerged earlier this year, has rapidly gained momentum...

More like this

Pro-Russian hackers target Italian airport websites – DW – 12/28/2024

Russian hackers were reported to have launched a cyberattack on the websites of Milan's...

North Korea actors utilize OtterCookie malware in Contagious Interview campaign – Source: securityaffairs.com

North Korea-linked threat actors have been identified using a new malware strain known as...

Live Webinar: Revealing North Korea’s Secret IT Army and Strategies for Combatting it

In a recent live webinar hosted by cybersecurity experts, the focus was on North...