Vulnerability Database

289,599

Total vulnerabilities in the database

CVE-2024-3393

A Denial of Service vulnerability in the DNS Security feature of Palo Alto Networks PAN-OS software allows an unauthenticated attacker to send a malicious packet through the data plane of the firewall that reboots the firewall. Repeated attempts to trigger this condition will cause the firewall to enter maintenance mode.

  • Published: Dec 27, 2024
  • Updated: May 4, 2025
  • CVE: CVE-2024-3393
  • Severity: High
  • Exploit:

CVSS v3:

  • Severity: High
  • Score: 7.5
  • AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CWEs:

Software From Fixed in
paloaltonetworks / pan-os 10.2.9 10.2.9.x
paloaltonetworks / pan-os 11.1.2 11.1.2.x
paloaltonetworks / pan-os 11.1.2-h1 11.1.2-h1.x
paloaltonetworks / pan-os 10.2.8 10.2.8.x
paloaltonetworks / pan-os 10.2.8-h3 10.2.8-h3.x
paloaltonetworks / pan-os 10.2.9-h1 10.2.9-h1.x
paloaltonetworks / pan-os 10.1.14 10.1.14.x
paloaltonetworks / pan-os 10.1.14-h2 10.1.14-h2.x
paloaltonetworks / pan-os 10.1.14-h4 10.1.14-h4.x
paloaltonetworks / pan-os 10.1.14-h6 10.1.14-h6.x
paloaltonetworks / pan-os 10.2.8-h4 10.2.8-h4.x
paloaltonetworks / pan-os 10.2.8-h10 10.2.8-h10.x
paloaltonetworks / pan-os 10.2.8-h13 10.2.8-h13.x
paloaltonetworks / pan-os 10.2.8-h15 10.2.8-h15.x
paloaltonetworks / pan-os 10.2.8-h18 10.2.8-h18.x
paloaltonetworks / pan-os 10.2.12 10.2.12.x
paloaltonetworks / pan-os 10.2.12-h1 10.2.12-h1.x
paloaltonetworks / pan-os 11.1.2-h3 11.1.2-h3.x
paloaltonetworks / pan-os 10.2.9-h9 10.2.9-h9.x
paloaltonetworks / pan-os 10.2.9-h11 10.2.9-h11.x
paloaltonetworks / pan-os 10.2.9-h14 10.2.9-h14.x
paloaltonetworks / pan-os 10.2.9-h16 10.2.9-h16.x
paloaltonetworks / pan-os 10.2.9-h18 10.2.9-h18.x
paloaltonetworks / pan-os 10.2.10 10.2.10.x
paloaltonetworks / pan-os 10.2.10-h2 10.2.10-h2.x
paloaltonetworks / pan-os 10.2.10-h3 10.2.10-h3.x
paloaltonetworks / pan-os 10.2.10-h4 10.2.10-h4.x
paloaltonetworks / pan-os 10.2.10-h5 10.2.10-h5.x
paloaltonetworks / pan-os 10.2.10-h7 10.2.10-h7.x
paloaltonetworks / pan-os 10.2.10-h9 10.2.10-h9.x
paloaltonetworks / pan-os 10.2.10-h10 10.2.10-h10.x
paloaltonetworks / pan-os 10.2.11 10.2.11.x
paloaltonetworks / pan-os 10.2.11-h1 10.2.11-h1.x
paloaltonetworks / pan-os 10.2.11-h2 10.2.11-h2.x
paloaltonetworks / pan-os 10.2.11-h3 10.2.11-h3.x
paloaltonetworks / pan-os 10.2.11-h4 10.2.11-h4.x
paloaltonetworks / pan-os 10.2.11-h6 10.2.11-h6.x
paloaltonetworks / pan-os 10.2.11-h9 10.2.11-h9.x
paloaltonetworks / pan-os 10.2.12-h2 10.2.12-h2.x
paloaltonetworks / pan-os 10.2.12-h3 10.2.12-h3.x
paloaltonetworks / pan-os 10.2.13 10.2.13.x
paloaltonetworks / pan-os 10.2.13-h1 10.2.13-h1.x
paloaltonetworks / pan-os 11.1.0 11.1.1.x
paloaltonetworks / pan-os 11.1.2-h4 11.1.2-h4.x
paloaltonetworks / pan-os 11.1.2-h9 11.1.2-h9.x
paloaltonetworks / pan-os 11.1.2-h12 11.1.2-h12.x
paloaltonetworks / pan-os 11.1.2-h14 11.1.2-h14.x
paloaltonetworks / pan-os 11.1.2-h15 11.1.2-h15.x
paloaltonetworks / pan-os 11.1.3 11.1.3.x
paloaltonetworks / pan-os 11.1.3-h1 11.1.3-h1.x
paloaltonetworks / pan-os 11.1.3-h10 11.1.3-h10.x
paloaltonetworks / pan-os 11.1.3-h11 11.1.3-h11.x
paloaltonetworks / pan-os 11.1.3-h2 11.1.3-h2.x
paloaltonetworks / pan-os 11.1.3-h4 11.1.3-h4.x
paloaltonetworks / pan-os 11.1.3-h6 11.1.3-h6.x
paloaltonetworks / pan-os 11.1.4 11.1.4.x
paloaltonetworks / pan-os 11.1.4-h1 11.1.4-h1.x
paloaltonetworks / pan-os 11.1.4-h4 11.1.4-h4.x
paloaltonetworks / pan-os 11.2.0 11.2.3