Palo Alto 安全中心 2024年07月04日
CVE-2024-3384 PAN-OS: Firewall Denial of Service (DoS) via Malformed NTLM Packets (Severity: HIGH)
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

Palo Alto Networks PAN-OS 软件存在一个漏洞,允许远程攻击者通过接收来自 Windows 服务器的 Windows 新技术 LAN 管理器 (NTLM) 数据包来重启 PAN-OS 防火墙。重复攻击最终会导致防火墙进入维护模式,需要手动干预才能使防火墙恢复在线。

💥 **漏洞描述:** 该漏洞允许远程攻击者通过向 PAN-OS 防火墙发送特制的 NTLM 数据包,导致防火墙重启。攻击者可以利用此漏洞来拒绝服务,使防火墙无法正常工作。

💥 **影响版本:** 该漏洞影响所有 PAN-OS 版本,包括 8.1、9.0、9.1、10.0、10.1、10.2、11.0 和 11.1。但 PAN-OS 8.1.24、9.0.17、9.1.15-h1、10.0.12 及更高版本已修复该漏洞。

💥 **修复建议:** Palo Alto Networks 建议所有用户尽快升级到最新版本的 PAN-OS 软件。此外,用户还应该检查防火墙的配置,确保 NTLM 身份验证已禁用。如果 NTLM 身份验证必须启用,则用户应该考虑使用其他身份验证机制来降低攻击风险。

Palo Alto Networks Security Advisories /CVE-2024-3384CVE-2024-3384 PAN-OS: Firewall Denial of Service (DoS) via Malformed NTLM PacketsUrgencyMODERATEResponse EffortMODERATERecoveryUSERValue DensityDIFFUSEAttack VectorNETWORKAttack ComplexityLOWAttack RequirementsPRESENTAutomatableNOUser InteractionNONEProduct ConfidentialityNONEProduct IntegrityNONEProduct AvailabilityHIGHPrivileges RequiredNONESubsequent ConfidentialityNONESubsequent IntegrityNONESubsequent AvailabilityNONENVDJSON Published2024-04-10 Updated2024-04-10ReferencePAN-198992DiscoveredexternallyDescriptionA vulnerability in Palo Alto Networks PAN-OS software enables a remote attacker to reboot PAN-OS firewalls when receiving Windows New Technology LAN Manager (NTLM) packets from Windows servers. Repeated attacks eventually cause the firewall to enter maintenance mode, which requires manual intervention to bring the firewall back online.Product StatusVersionsAffectedUnaffectedCloud NGFW NoneAllPAN-OS 11.1NoneAllPAN-OS 11.0NoneAllPAN-OS 10.2NoneAllPAN-OS 10.1NoneAllPAN-OS 10.0< 10.0.12>= 10.0.12PAN-OS 9.1< 9.1.15-h1>= 9.1.15-h1PAN-OS 9.0< 9.0.17>= 9.0.17PAN-OS 8.1< 8.1.24>= 8.1.24Prisma Access NoneAllRequired Configuration for ExposureThis issue affects only PAN-OS configurations with NTLM authentication enabled. You should verify whether NTLM authentication is enabled by checking your firewall web interface (Device > User Identification > User Mapping > Palo Alto Networks User-ID Agent Setup > NTLM).Severity:HIGHCVSSv4.0Base Score:8.2 (CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/AU:N/R:U/V:D/RE:M/U:Amber)Exploitation StatusPalo Alto Networks is not aware of any malicious exploitation of this issue.Weakness TypeCWE-1286 Improper Validation of Syntactic Correctness of InputSolutionThis issue is fixed in PAN-OS 8.1.24, PAN-OS 9.0.17, PAN-OS 9.1.15-h1, PAN-OS 10.0.12, and all later PAN-OS versions.AcknowledgmentsPalo Alto Networks thanks rqu for discovering and reporting this issue.Timeline2024-04-10Initial publication

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

Palo Alto Networks PAN-OS 拒绝服务 漏洞 CVE-2024-3384 NTLM
相关文章