HomeCyber BalkansPalo Alto Networks Vulnerability Exposes Firewalls to DoS Attacks

Palo Alto Networks Vulnerability Exposes Firewalls to DoS Attacks

Published on

spot_img

A critical vulnerability, identified as CVE-2024-3393, has been discovered within the DNS Security feature of Palo Alto Networks’ PAN-OS software. This flaw allows unauthenticated attackers to exploit firewalls by sending specially crafted packets, resulting in denial-of-service (DoS) conditions.

The issue has been actively exploited, prompting urgent mitigation measures to be taken by organizations utilizing Palo Alto Networks’ firewalls. Experts have warned that this vulnerability poses a significant risk to system availability and can have severe consequences if not addressed promptly.

The vulnerability arises from improper handling of malicious DNS packets within the data plane of affected firewalls. Attackers can exploit this flaw by sending a specific type of packet that forces the firewall to reboot. With repeated exploitation, the firewall can be pushed into maintenance mode, rendering it non-operational. This high-severity issue has been assigned a CVSS score of 8.7, underlining its critical impact on system availability.

Key characteristics of the vulnerability include a network-based attack vector, low attack complexity, and the absence of privileges or user interaction required for exploitation. The flaw affects certain versions of PAN-OS, specifically versions below 11.2.3, 11.1.5, and select maintenance releases of 10.1 and 10.2.

The vulnerability has already been observed in production environments where DNS Security logging is enabled. Its exploitation can lead to significant service disruptions, especially for organizations that heavily rely on Palo Alto Networks’ firewalls for essential network security operations. While confidentiality and integrity remain unaffected, the availability of systems is severely compromised, as confirmed by reports of DoS attacks triggered by this issue.

The weakness has been categorized under CWE-754 (Improper Check for Unusual or Exceptional Conditions) and CAPEC-540 (Overread Buffers), highlighting the nature of the vulnerability and its potential impact on affected systems.

To address the vulnerability, Palo Alto Networks has released patches for various PAN-OS versions, including 11.2.3, 11.1.5, 10.2.10-h12, 10.2.13-h2, and 10.1.14-h8. For Prisma Access customers, upgrades will be rolled out in phases on January 3rd and January 10th, 2025, with the option for expedited upgrades through support cases. In the meantime, administrators can disable DNS Security logging as a temporary workaround by adjusting Anti-spyware profiles.

Organizations are strongly advised to update affected systems promptly or implement recommended mitigations to prevent service disruptions caused by this critical vulnerability. Proactive measures should be taken to safeguard network security and maintain system availability in the face of potential threats exploiting this flaw.

In conclusion, the discovery of vulnerability CVE-2024-3393 within Palo Alto Networks’ PAN-OS software serves as a reminder of the ongoing risks and challenges faced in the ever-evolving landscape of cybersecurity. By promptly addressing this issue and implementing necessary safeguards, organizations can enhance their resilience against potential threats and ensure the continuous operation of critical network infrastructure.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...