CVE-2024-3384

7.5 HIGH

📋 TL;DR

A vulnerability in Palo Alto Networks PAN-OS software allows remote attackers to reboot firewalls by sending Windows NTLM packets from Windows servers. Repeated exploitation can force firewalls into maintenance mode requiring manual recovery. This affects organizations running vulnerable PAN-OS versions on Palo Alto firewalls.

💻 Affected Systems

Products:
  • Palo Alto Networks PAN-OS
Versions: PAN-OS 11.1.0 through 11.1.2-h3, PAN-OS 11.0.0 through 11.0.4-h4, PAN-OS 10.2.0 through 10.2.9-h1, PAN-OS 10.1.0 through 10.1.12-h4, PAN-OS 9.1.0 through 9.1.18-h1
Operating Systems: PAN-OS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects firewalls receiving NTLM packets from Windows servers. Requires NTLM traffic to reach firewall interfaces.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sustained denial-of-service causing firewalls to enter maintenance mode, requiring manual intervention and potentially creating extended network outages.

🟠

Likely Case

Intermittent firewall reboots disrupting network traffic and security services until patched.

🟢

If Mitigated

Minimal impact with proper network segmentation and access controls limiting NTLM traffic to firewalls.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending NTLM packets to vulnerable firewalls. No authentication needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: PAN-OS 11.1.2-h4, PAN-OS 11.0.4-h5, PAN-OS 10.2.9-h2, PAN-OS 10.1.12-h5, PAN-OS 9.1.18-h2

Vendor Advisory: https://security.paloaltonetworks.com/CVE-2024-3384

Restart Required: Yes

Instructions:

1. Download appropriate hotfix from Palo Alto support portal. 2. Upload to firewall. 3. Install hotfix. 4. Reboot firewall as required.

🔧 Temporary Workarounds

Block NTLM traffic to firewalls

all

Implement network access controls to prevent NTLM packets from reaching firewall interfaces

Disable NTLM authentication

windows

Configure Windows servers to use Kerberos instead of NTLM where possible

🧯 If You Can't Patch

  • Implement strict network segmentation to limit NTLM traffic to firewall interfaces
  • Monitor firewall logs for reboot events and NTLM traffic patterns

🔍 How to Verify

Check if Vulnerable:

Check PAN-OS version via WebUI or CLI. If version falls within affected ranges, system is vulnerable.

Check Version:

show system info | match version

Verify Fix Applied:

Verify PAN-OS version is patched to recommended hotfix version or later.

📡 Detection & Monitoring

Log Indicators:

  • Firewall reboot events
  • Unexpected maintenance mode entries
  • Increased NTLM authentication attempts

Network Indicators:

  • Spike in NTLM traffic to firewall interfaces
  • Unusual NTLM packet patterns

SIEM Query:

source="pan-firewall" AND (event_type="reboot" OR event_type="maintenance_mode")

🔗 References

📤 Share & Export