CVE-2024-2550

7.5 HIGH

📋 TL;DR

An unauthenticated attacker can send a specially crafted packet to Palo Alto Networks PAN-OS GlobalProtect gateways, causing a null pointer dereference that stops the GlobalProtect service. Repeated exploitation forces the firewall into maintenance mode, creating a denial of service. Organizations using affected PAN-OS versions with GlobalProtect enabled are vulnerable.

💻 Affected Systems

Products:
  • Palo Alto Networks PAN-OS
Versions: PAN-OS 11.1 versions earlier than 11.1.2-h3, PAN-OS 11.0 versions earlier than 11.0.4-h1, PAN-OS 10.2 versions earlier than 10.2.9-h1, and all versions of PAN-OS 10.1 and PAN-OS 9.1
Operating Systems: PAN-OS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects firewalls with GlobalProtect gateway enabled. Prisma Access customers are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Firewall enters maintenance mode, disrupting all GlobalProtect VPN connectivity and potentially affecting other firewall services, requiring manual intervention to restore functionality.

🟠

Likely Case

GlobalProtect service crashes, interrupting VPN access for remote users until service restart or firewall reboot.

🟢

If Mitigated

If patched or workarounds applied, no impact beyond normal packet processing.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Unauthenticated remote exploitation with simple packet crafting makes this attractive for attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: PAN-OS 11.1.2-h3, PAN-OS 11.0.4-h1, PAN-OS 10.2.9-h1

Vendor Advisory: https://security.paloaltonetworks.com/CVE-2024-2550

Restart Required: Yes

Instructions:

1. Download appropriate hotfix from Palo Alto support portal. 2. Upload to firewall. 3. Install hotfix via CLI or WebUI. 4. Commit changes. 5. Reboot firewall.

🔧 Temporary Workarounds

Disable GlobalProtect Gateway

all

Temporarily disable GlobalProtect gateway service if VPN access can be suspended

Restrict Access to GlobalProtect Ports

all

Limit source IP addresses that can connect to GlobalProtect service (default port 443)

🧯 If You Can't Patch

  • Implement strict network ACLs to limit GlobalProtect access to trusted IP ranges only
  • Monitor GlobalProtect service health and implement automated restart scripts for service recovery

🔍 How to Verify

Check if Vulnerable:

Check PAN-OS version via CLI: show system info | match version. Compare against affected versions list.

Check Version:

show system info | match version

Verify Fix Applied:

Verify installed version matches patched versions. Check GlobalProtect service status: show global-protect-gateway statistics.

📡 Detection & Monitoring

Log Indicators:

  • GlobalProtect service crash logs
  • Firewall entering maintenance mode events
  • Repeated connection attempts to GlobalProtect port 443

Network Indicators:

  • Multiple malformed packets to GlobalProtect port
  • Sudden drop in GlobalProtect VPN connections

SIEM Query:

source="pan-firewall" (event_type="system" AND message="*GlobalProtect*crash*") OR (event_type="system" AND message="*maintenance*mode*")

🔗 References

📤 Share & Export