CVE-2024-3393

7.5 HIGH

📋 TL;DR

An unauthenticated attacker can send a malicious DNS packet through a Palo Alto Networks firewall's data plane, causing the firewall to reboot. Repeated exploitation forces the firewall into maintenance mode, resulting in complete network disruption. This affects organizations running vulnerable PAN-OS versions with DNS Security enabled.

💻 Affected Systems

Products:
  • Palo Alto Networks PAN-OS
Versions: PAN-OS 11.1.x < 11.1.2-h3, PAN-OS 11.0.x < 11.0.4-h1, PAN-OS 10.2.x < 10.2.9-h1, PAN-OS 10.1.x < 10.1.14-h4
Operating Systems: PAN-OS
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when DNS Security feature is enabled. Cloud NGFW, Panorama appliances, and Prisma Access are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Firewall enters maintenance mode after repeated attacks, causing complete network outage until manual intervention restores service.

🟠

Likely Case

Firewall reboots unexpectedly, causing temporary network disruption and potential traffic loss during failover.

🟢

If Mitigated

With proper segmentation and monitoring, impact is limited to isolated network segments with quick detection and recovery.

🌐 Internet-Facing: HIGH - Attackers can send malicious packets directly to internet-facing interfaces without authentication.
🏢 Internal Only: MEDIUM - Requires attacker access to internal network, but still unauthenticated exploitation possible.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CISA has added this to Known Exploited Vulnerabilities catalog. Exploitation requires sending specially crafted DNS packets through data plane.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: PAN-OS 11.1.2-h3, 11.0.4-h1, 10.2.9-h1, 10.1.14-h4

Vendor Advisory: https://security.paloaltonetworks.com/CVE-2024-3393

Restart Required: Yes

Instructions:

1. Download appropriate hotfix from Palo Alto support portal. 2. Upload to firewall. 3. Install hotfix. 4. Reboot firewall to complete installation.

🔧 Temporary Workarounds

Disable DNS Security

all

Temporarily disable DNS Security feature to prevent exploitation while patching.

Navigate to Device > DNS Security > DNS Security Profile > Disable

Restrict DNS Traffic

all

Implement strict firewall rules to limit DNS traffic to trusted sources only.

Create security policy restricting UDP/TCP port 53 to authorized DNS servers

🧯 If You Can't Patch

  • Disable DNS Security feature immediately
  • Implement strict network segmentation to limit exposure of vulnerable firewalls

🔍 How to Verify

Check if Vulnerable:

Check PAN-OS version and DNS Security status: show system info | match version; show running security-profile dns-security

Check Version:

show system info | match version

Verify Fix Applied:

Verify installed version is patched: show system info | match version; show system software status

📡 Detection & Monitoring

Log Indicators:

  • Unexpected firewall reboots
  • Maintenance mode entries in system logs
  • DNS Security process crashes

Network Indicators:

  • Unusual DNS traffic patterns to firewall interfaces
  • Multiple malformed DNS packets

SIEM Query:

source="pan-firewall" AND (event="system-reboot" OR event="maintenance-mode")

🔗 References

📤 Share & Export