Unauthenticated Packet Flood Vulnerability in Palo Alto Networks PAN-OS Web Proxy
A missing exception check in Palo Alto Networks PAN-OS® software with the web proxy feature enabled allows an unauthenticated malicious user to send a burst of maliciously crafted packets that causes the firewall to become unresponsive and eventually reboot. Repeated successful attempts to trigger this condition will cause the firewall to enter maintenance mode.
This issue does not affect Cloud NGFW or Prisma Access.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
paloaltonetworks pan-os 11.2.4 |
||
paloaltonetworks pan-os 11.2.3 |
||
paloaltonetworks pan-os 11.2.2 |
||
paloaltonetworks pan-os 11.2.1 |
||
paloaltonetworks pan-os 11.2.0 |
||
paloaltonetworks pan-os 11.1.6 |
||
paloaltonetworks pan-os 11.1.5 |
||
paloaltonetworks pan-os 11.1.4 |
||
paloaltonetworks pan-os 11.1.3 |
||
paloaltonetworks pan-os 11.1.2 |
||
paloaltonetworks pan-os 11.1.1 |
||
paloaltonetworks pan-os 11.1.0 |
||
palo alto networks cloud ngfw |
||
palo alto networks pan-os |
||
palo alto networks prisma access |