CVE-2024-9468

Out-of-bounds Write (CWE-787)

Published: Oct 9, 2024 / Updated: 41d ago

010
CVSS 8.2EPSS 0.04%High
CVE info copied to clipboard

Summary

A memory corruption vulnerability in Palo Alto Networks PAN-OS software allows an unauthenticated attacker to crash PAN-OS due to a crafted packet through the data plane, resulting in a denial of service (DoS) condition. Repeated attempts to trigger this condition will result in PAN-OS entering maintenance mode.

Impact

This vulnerability can lead to a denial of service (DoS) condition in Palo Alto Networks PAN-OS software. An unauthenticated attacker can exploit this vulnerability by sending crafted packets through the data plane, causing the PAN-OS to crash. Repeated exploitation attempts can force the system into maintenance mode, potentially causing extended downtime and disruption of network services protected by the affected PAN-OS devices.

Exploitation

There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.

Patch

Based on the provided information, there is no explicit mention of a patch being available. The security team should closely monitor Palo Alto Networks' security advisories for updates on patch availability.

Mitigation

While waiting for an official patch, consider the following mitigation strategies: 1. Implement strict access controls and network segmentation to limit potential attackers' ability to reach the vulnerable systems. 2. Monitor system logs for signs of exploitation attempts or unusual crashes. 3. If possible, configure intrusion prevention systems (IPS) or firewalls to detect and block crafted packets that may exploit this vulnerability. 4. Have a plan in place to quickly restore systems from maintenance mode if affected. 5. Consider implementing redundancy measures to maintain network availability in case of a successful attack.

CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:U/V:C/RE:L/U:Amber

Timeline

CVE Assignment

NVD published the first details for CVE-2024-9468

Oct 9, 2024 at 5:15 PM
CVSS

A CVSS base score of 8.2 has been assigned.

Oct 9, 2024 at 5:20 PM / nvd
First Article

Feedly found the first article mentioning CVE-2024-9468. See article

Oct 9, 2024 at 5:24 PM / National Vulnerability Database
CVSS Estimate

Feedly estimated the CVSS score as MEDIUM

Oct 9, 2024 at 5:24 PM
EPSS

EPSS Score was set to: 0.04% (Percentile: 9.7%)

Oct 10, 2024 at 10:30 AM
Static CVE Timeline Graph

Affected Systems

Paloaltonetworks/pan-os
+null more

News

[no-title]
Prisma Cloud Compute Cortex XDR Agent 8.6
Update Sat Oct 19 22:37:53 UTC 2024
Update Sat Oct 19 22:37:53 UTC 2024
CVE ID
Device details : PAN-PA-5060 / Palo Alto There are 6 CVEs in the advisory. DESCRIPTION: CVE-2024-9463: CVSS: 9.9 CVE-2024-9464: CVSS: 9.3 CVE-2024-9465: CVSS: 9.2 CVE-2024-9466:
Tageszusammenfassung - 10.10.2024
Project: GutenbergDate: 2024-October-09Security risk: Moderately critical 12 - 25 AC:Basic/A:None/CI:None/II:Some/E:Theoretical/TD:DefaultVulnerability: Cross Site Request ForgeryAffected versions: =3.0.0 Description: This module provides a new UI experience for node editing using the Gutenberg Editor library.The module did not sufficiently protect some routes against a Cross Site Request Forgery attack.This vulnerability is mitigated by the fact that the tricked user needs to have an Project: FacetsDate: 2024-October-09Security risk: Critical 15 - 25 AC:Basic/A:None/CI:Some/II:Some/E:Theoretical/TD:DefaultVulnerability: Cross Site ScriptingAffected versions: Description: This module enables you to to easily create and manage faceted search interfaces.The module doesnt sufficiently filter for malicious script leading to a reflected cross site scripting (XSS) vulnerability.Solution: Install the latest version:If you use the Facets module, upgrade to Facets
Remote denial of service in PAN-OS firewall
Can this vulnerability be exploited remotely? This security bulletin contains one medium risk vulnerability.
See 11 more articles and social media posts

CVSS V3.1

Unknown

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI