Palo Alto 安全中心 2024年11月14日
CVE-2024-9472 PAN-OS: Firewall Denial of Service (DoS) Using Specially Crafted Traffic (Severity: MEDIUM)
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

Palo Alto Networks PAN-OS软件在特定硬件平台上存在漏洞,启用解密策略时,未授权攻击者可通过特定流量使PAN-OS崩溃,导致拒绝服务。VM-Series等不受影响,该问题在特定版本中存在,已在多个后续版本中修复。

🎯PA-800等系列硬件平台的PAN-OS软件存在漏洞

🚫未授权攻击者可利用漏洞使系统崩溃并致DoS

💡特定版本存在问题,多个后续版本已修复

🧐仅部分配置防火墙受影响,VM-Series等无影响

A null pointer dereference in Palo Alto Networks PAN-OS software on PA-800 Series, PA-3200 Series, PA-5200 Series, and PA-7000 Series hardware platforms when Decryption policy is enabled allows an unauthenticated attacker to crash PAN-OS by sending specific traffic through the data plane, resulting in a denial of service (DoS) condition. Repeated attempts to trigger this condition will result in PAN-OS entering maintenance mode.Palo Alto Networks VM-Series, Cloud NGFW, and Prisma Access are not affected.This issue only affects PA-800 Series, PA-3200 Series, PA-5200 Series, and PA-7000 Series running these specific versions of PAN-OS:This issue is only applicable firewalls where url proxy or any decrypt-policy is configured.When any decrypt policy is configured, this issue may be encountered regardless of whether traffic matches explicit decrypt, explicit no-decrypt, or none of the decryption policies.Palo Alto Networks is not aware of any malicious exploitation of this issue. However, customers have reported encountering this issue during normal operations.This issue is fixed in PAN-OS 10.2.7-h16, PAN-OS 10.2.8-h13, PAN-OS 10.2.9-h14, PAN-OS 10.2.10-h7, PAN-OS 10.2.11-h4, PAN-OS 11.1.2-h14, PAN-OS 11.1.3-h10, PAN-OS 11.2.2-h3, PAN-OS 11.2.3, and all later PAN-OS versions.This issue does not impact firewalls that do not have url proxy or any decrypt-policy configured.cpe:2.3:o:paloaltonetworks:pan-os:11.2.2:h1::::::cpe:2.3:o:paloaltonetworks:pan-os:11.2.1:-::::::cpe:2.3:o:paloaltonetworks:pan-os:11.2.0:-::::::cpe:2.3:o:paloaltonetworks:pan-os:11.2:-::::::cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h13::::::cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h12::::::cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h11::::::cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h10::::::cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h9::::::cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h8::::::cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h7::::::cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h6::::::cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h5::::::cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h4::::::cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h3::::::cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h2::::::cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h1::::::cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:-::::::cpe:2.3:o:paloaltonetworks:pan-os:11.1.1:h1::::::cpe:2.3:o:paloaltonetworks:pan-os:11.1.1:-::::::cpe:2.3:o:paloaltonetworks:pan-os:11.1.0:h3::::::cpe:2.3:o:paloaltonetworks:pan-os:11.1.0:h2::::::cpe:2.3:o:paloaltonetworks:pan-os:11.1.0:h1::::::cpe:2.3:o:paloaltonetworks:pan-os:11.1.0:-::::::cpe:2.3:o:paloaltonetworks:pan-os:11.1:-::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h15::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h14::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h13::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h12::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h11::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h10::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h9::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h8::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h7::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h6::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h5::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h4::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h3::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h2::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h1::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:-::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.6:h3::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.6:h2::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.6:h1::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.6:-::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:h6::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:h5::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:h4::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:h3::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:h2::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:h1::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.5:-::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h16::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h15::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h14::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h13::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h12::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h11::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h10::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h9::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h8::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h7::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h6::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h5::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h4::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h3::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h2::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h1::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:-::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h13::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h12::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h11::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h10::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h9::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h8::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h7::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h6::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h5::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h4::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h3::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h2::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h1::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:-::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:h5::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:h4::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:h3::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:h2::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:h1::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:-::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.1:h2::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.1:h1::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.1:-::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.0:h3::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.0:h2::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.0:h1::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2.0:-::::::cpe:2.3:o:paloaltonetworks:pan-os:10.2:-::::::Show MoreShow Less

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

Palo Alto Networks PAN-OS 软件漏洞 拒绝服务
相关文章