Vulnerability Database

314,453

Total vulnerabilities in the database

CVE-2024-9468

A memory corruption vulnerability in Palo Alto Networks PAN-OS software allows an unauthenticated attacker to crash PAN-OS due to a crafted packet through the data plane, resulting in a denial of service (DoS) condition. Repeated attempts to trigger this condition will result in PAN-OS entering maintenance mode.

  • Published: Oct 9, 2024
  • Updated: Dec 2, 2025
  • CVE: CVE-2024-9468
  • Severity: High
  • Exploit:

CVSS v3:

  • Severity: High
  • Score: 7.5
  • AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CWEs:

Software From Fixed in
paloaltonetworks / pan-os 10.2.0 10.2.4
paloaltonetworks / pan-os 10.2.5 10.2.7
paloaltonetworks / pan-os 11.0.0 11.0.4
paloaltonetworks / pan-os 11.0.5 11.0.6
paloaltonetworks / pan-os 11.1.0 11.1.3
paloaltonetworks / pan-os 10.2.4 10.2.4.x
paloaltonetworks / pan-os 10.2.4-h10 10.2.4-h10.x
paloaltonetworks / pan-os 10.2.4-h16 10.2.4-h16.x
paloaltonetworks / pan-os 10.2.4-h2 10.2.4-h2.x
paloaltonetworks / pan-os 10.2.4-h3 10.2.4-h3.x
paloaltonetworks / pan-os 10.2.4-h4 10.2.4-h4.x
paloaltonetworks / pan-os 10.2.7 10.2.7.x
paloaltonetworks / pan-os 10.2.7-h1 10.2.7-h1.x
paloaltonetworks / pan-os 10.2.7-h10 10.2.7-h10.x
paloaltonetworks / pan-os 10.2.7-h11 10.2.7-h11.x
paloaltonetworks / pan-os 10.2.7-h12 10.2.7-h12.x
paloaltonetworks / pan-os 10.2.7-h13 10.2.7-h13.x
paloaltonetworks / pan-os 10.2.7-h14 10.2.7-h14.x
paloaltonetworks / pan-os 10.2.7-h15 10.2.7-h15.x
paloaltonetworks / pan-os 10.2.7-h16 10.2.7-h16.x
paloaltonetworks / pan-os 10.2.7-h17 10.2.7-h17.x
paloaltonetworks / pan-os 10.2.7-h18 10.2.7-h18.x
paloaltonetworks / pan-os 10.2.7-h19 10.2.7-h19.x
paloaltonetworks / pan-os 10.2.7-h2 10.2.7-h2.x
paloaltonetworks / pan-os 10.2.7-h20 10.2.7-h20.x
paloaltonetworks / pan-os 10.2.7-h21 10.2.7-h21.x
paloaltonetworks / pan-os 10.2.7-h22 10.2.7-h22.x
paloaltonetworks / pan-os 10.2.7-h23 10.2.7-h23.x
paloaltonetworks / pan-os 10.2.8 10.2.8.x
paloaltonetworks / pan-os 10.2.8-h1 10.2.8-h1.x
paloaltonetworks / pan-os 10.2.8-h10 10.2.8-h10.x
paloaltonetworks / pan-os 10.2.8-h11 10.2.8-h11.x
paloaltonetworks / pan-os 10.2.8-h12 10.2.8-h12.x
paloaltonetworks / pan-os 10.2.8-h13 10.2.8-h13.x
paloaltonetworks / pan-os 10.2.8-h14 10.2.8-h14.x
paloaltonetworks / pan-os 10.2.8-h15 10.2.8-h15.x
paloaltonetworks / pan-os 10.2.8-h16 10.2.8-h16.x
paloaltonetworks / pan-os 10.2.8-h17 10.2.8-h17.x
paloaltonetworks / pan-os 10.2.8-h18 10.2.8-h18.x
paloaltonetworks / pan-os 10.2.8-h19 10.2.8-h19.x
paloaltonetworks / pan-os 10.2.8-h2 10.2.8-h2.x
paloaltonetworks / pan-os 10.2.8-h3 10.2.8-h3.x
paloaltonetworks / pan-os 10.2.8-h4 10.2.8-h4.x
paloaltonetworks / pan-os 10.2.8-h5 10.2.8-h5.x
paloaltonetworks / pan-os 10.2.8-h6 10.2.8-h6.x
paloaltonetworks / pan-os 10.2.8-h7 10.2.8-h7.x
paloaltonetworks / pan-os 10.2.8-h8 10.2.8-h8.x
paloaltonetworks / pan-os 10.2.8-h9 10.2.8-h9.x
paloaltonetworks / pan-os 10.2.9 10.2.9.x
paloaltonetworks / pan-os 10.2.9-h1 10.2.9-h1.x
paloaltonetworks / pan-os 10.2.9-h2 10.2.9-h2.x
paloaltonetworks / pan-os 10.2.9-h3 10.2.9-h3.x
paloaltonetworks / pan-os 10.2.9-h4 10.2.9-h4.x
paloaltonetworks / pan-os 10.2.9-h5 10.2.9-h5.x
paloaltonetworks / pan-os 10.2.9-h6 10.2.9-h6.x
paloaltonetworks / pan-os 10.2.9-h7 10.2.9-h7.x
paloaltonetworks / pan-os 10.2.9-h8 10.2.9-h8.x
paloaltonetworks / pan-os 10.2.9-h9 10.2.9-h9.x
paloaltonetworks / pan-os 10.2.10 10.2.10.x
paloaltonetworks / pan-os 10.2.10-h1 10.2.10-h1.x
paloaltonetworks / pan-os 10.2.10-h2 10.2.10-h2.x
paloaltonetworks / pan-os 10.2.10-h3 10.2.10-h3.x
paloaltonetworks / pan-os 11.0.4 11.0.4.x
paloaltonetworks / pan-os 11.0.4-h1 11.0.4-h1.x
paloaltonetworks / pan-os 11.0.4-h2 11.0.4-h2.x