CVE-2024-3393

Palo Alto Networks PAN-OS — Palo Alto Networks PAN-OS Malicious DNS Packet Vulnerability
⚠️ CVSS 3.1  7.5 / 10 — HIGH 🔴 CISA Known Exploited Vulnerability

Overview

Palo Alto Networks PAN-OS contains a vulnerability in parsing and logging malicious DNS packets in the DNS Security feature that, when exploited, allows an unauthenticated attacker to remotely reboot the firewall. Repeated attempts to trigger this condition will cause the firewall to enter maintenance mode.

https://security.paloaltonetworks.com/CVE-2024-3393 ; https://nvd.nist.gov/vuln/detail/CVE-2024-3393

Key Details

PropertyValue
CVE ID CVE-2024-3393
Vendor / Product Palo Alto Networks — PAN-OS
NVD Published2024-12-27
NVD Last Modified2025-11-04
CVSS 3.1 Score7.5
CVSS 3.1 VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
SeverityHIGH
CWE CWE-754
CISA KEV Added2024-12-30
CISA KEV Deadline2025-01-20
Known Ransomware Use No

CVSS 3.1 Breakdown

Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High

Required Action

CISA BOD 22-01 Deadline: 2025-01-20. Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Timeline

DateEvent
2024-12-30Added to CISA Known Exploited Vulnerabilities catalog
2025-01-20CISA BOD 22-01 remediation deadline

References

ResourceType
NVD — CVE-2024-3393 Vulnerability Database
CISA KEV Catalog Entry US Government