Palo Alto 安全中心 2024年07月04日
CVE-2024-3382 PAN-OS: Firewall Denial of Service (DoS) via a Burst of Crafted Packets (Severity: HIGH)
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

Palo Alto Networks PAN-OS 软件中存在一个内存泄漏漏洞,攻击者可利用该漏洞向防火墙发送大量精心构造的数据包,最终导致防火墙无法处理流量。该漏洞仅影响运行启用了 SSL 转发代理功能的 PAN-OS 软件的 PA-5400 系列设备。

😄 **漏洞描述:** Palo Alto Networks PAN-OS 软件中存在一个内存泄漏漏洞,攻击者可利用该漏洞向防火墙发送大量精心构造的数据包,最终导致防火墙无法处理流量。

🤔 **受影响的产品:** 该漏洞仅影响运行启用了 SSL 转发代理功能的 PAN-OS 软件的 PA-5400 系列设备。

😔 **解决方案:** 该漏洞已在 PAN-OS 10.2.7-h3、PAN-OS 11.0.4、PAN-OS 11.1.2 及更高版本中修复。

💪 **缓解措施:** 您可以通过禁用防火墙上的解密功能来缓解此问题。要临时禁用 SSL 解密,请参考您的 PAN-OS 软件的管理指南(例如 PAN-OS 11.1:https://docs.paloaltonetworks.com/pan-os/11-1/pan-os-admin/decryption/temporarily-disable-ssl-decryption)。此外,为了确保解密在重启后保持禁用状态,请配置基于策略的解密排除,该排除将排除所有流量被解密(https://docs.paloaltonetworks.com/pan-os/11-1/pan-os-admin/decryption/decryption-exclusions/create-a-policy-based-decryption-exclusion)。

Palo Alto Networks Security Advisories /CVE-2024-3382CVE-2024-3382 PAN-OS: Firewall Denial of Service (DoS) via a Burst of Crafted PacketsUrgencyMODERATEResponse EffortLOWRecoveryUSERValue DensityDIFFUSEAttack VectorNETWORKAttack ComplexityHIGHAttack RequirementsPRESENTAutomatableYESUser InteractionNONEProduct ConfidentialityNONEProduct IntegrityNONEProduct AvailabilityHIGHPrivileges RequiredNONESubsequent ConfidentialityNONESubsequent IntegrityNONESubsequent AvailabilityNONENVDJSON Published2024-04-10 Updated2024-04-10ReferencePAN-234921Discoveredin production useDescriptionA memory leak exists in Palo Alto Networks PAN-OS software that enables an attacker to send a burst of crafted packets through the firewall that eventually prevents the firewall from processing traffic. This issue applies only to PA-5400 Series devices that are running PAN-OS software with the SSL Forward Proxy feature enabled.Product StatusVersionsAffectedUnaffectedCloud NGFW NoneAllPAN-OS 11.1< 11.1.2>= 11.1.2PAN-OS 11.0< 11.0.4>= 11.0.4PAN-OS 10.2< 10.2.7-h3>= 10.2.7-h3PAN-OS 10.1NoneAllPAN-OS 9.1NoneAllPAN-OS 9.0NoneAllPrisma Access NoneAllRequired Configuration for ExposureThis issue applies only to PA-5400 Series devices that are running PAN-OS firewall configurations with the SSL Forward Proxy feature enabled. You can verify whether you have the SSL Forward Proxy feature enabled by checking for decryption policy rules in your firewall web interface (Policies > Decryption).Severity:HIGHCVSSv4.0Base Score:8.2 (CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/AU:Y/R:U/V:D/RE:L/U:Amber)Exploitation StatusPalo Alto Networks is not aware of any malicious exploitation of this issue.Weakness TypeCWE-770 Allocation of Resources Without Limits or ThrottlingSolutionThis issue is fixed in PAN-OS 10.2.7-h3, PAN-OS 11.0.4, PAN-OS 11.1.2, and all later PAN-OS versions.Workarounds and MitigationsYou can mitigate this issue by disabling decryption on your firewalls. To temporarily disable SSL Decryption, refer to the administrator’s guide for your PAN-OS software (such as PAN-OS 11.1: https://docs.paloaltonetworks.com/pan-os/11-1/pan-os-admin/decryption/temporarily-disable-ssl-decryption). Additionally, to ensure that decryption remains disabled after a reboot, configure a policy-based decryption exclusion that excludes all traffic from being decrypted (https://docs.paloaltonetworks.com/pan-os/11-1/pan-os-admin/decryption/decryption-exclusions/create-a-policy-based-decryption-exclusion).AcknowledgmentsPalo Alto Networks thanks Celedonio Albarran of Equity Residential and their Infrastructure and Security teams for discovering and reporting this issue.Timeline2024-04-10Initial publication

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

Palo Alto Networks PAN-OS 漏洞 CVE-2024-3382 拒绝服务攻击 安全
相关文章