7.5
CVE-2024-3382
- EPSS 0.37%
- Veröffentlicht 10.04.2024 17:15:56
- Zuletzt bearbeitet 22.01.2025 15:44:24
- Quelle psirt@paloaltonetworks.com
- Teams Watchlist Login
- Unerledigt Login
A memory leak exists in Palo Alto Networks PAN-OS software that enables an attacker to send a burst of crafted packets through the firewall that eventually prevents the firewall from processing traffic. This issue applies only to PA-5400 Series devices that are running PAN-OS software with the SSL Forward Proxy feature enabled.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Paloaltonetworks ≫ Pan-os Version >= 10.2.0 < 10.2.7
Paloaltonetworks ≫ Pa-5410 Version-
Paloaltonetworks ≫ Pa-5420 Version-
Paloaltonetworks ≫ Pa-5430 Version-
Paloaltonetworks ≫ Pa-5440 Version-
Paloaltonetworks ≫ Pa-5445 Version-
Paloaltonetworks ≫ Pa-5420 Version-
Paloaltonetworks ≫ Pa-5430 Version-
Paloaltonetworks ≫ Pa-5440 Version-
Paloaltonetworks ≫ Pa-5445 Version-
Paloaltonetworks ≫ Pan-os Version >= 11.0.0 < 11.0.4
Paloaltonetworks ≫ Pa-5410 Version-
Paloaltonetworks ≫ Pa-5420 Version-
Paloaltonetworks ≫ Pa-5430 Version-
Paloaltonetworks ≫ Pa-5440 Version-
Paloaltonetworks ≫ Pa-5445 Version-
Paloaltonetworks ≫ Pa-5420 Version-
Paloaltonetworks ≫ Pa-5430 Version-
Paloaltonetworks ≫ Pa-5440 Version-
Paloaltonetworks ≫ Pa-5445 Version-
Paloaltonetworks ≫ Pan-os Version >= 11.1.0 < 11.1.2
Paloaltonetworks ≫ Pa-5410 Version-
Paloaltonetworks ≫ Pa-5420 Version-
Paloaltonetworks ≫ Pa-5430 Version-
Paloaltonetworks ≫ Pa-5440 Version-
Paloaltonetworks ≫ Pa-5445 Version-
Paloaltonetworks ≫ Pa-5420 Version-
Paloaltonetworks ≫ Pa-5430 Version-
Paloaltonetworks ≫ Pa-5440 Version-
Paloaltonetworks ≫ Pa-5445 Version-
Paloaltonetworks ≫ Pan-os Version10.2.7 Update-
Paloaltonetworks ≫ Pa-5410 Version-
Paloaltonetworks ≫ Pa-5420 Version-
Paloaltonetworks ≫ Pa-5430 Version-
Paloaltonetworks ≫ Pa-5440 Version-
Paloaltonetworks ≫ Pa-5445 Version-
Paloaltonetworks ≫ Pa-5420 Version-
Paloaltonetworks ≫ Pa-5430 Version-
Paloaltonetworks ≫ Pa-5440 Version-
Paloaltonetworks ≫ Pa-5445 Version-
Paloaltonetworks ≫ Pan-os Version10.2.7 Updateh1
Paloaltonetworks ≫ Pa-5410 Version-
Paloaltonetworks ≫ Pa-5420 Version-
Paloaltonetworks ≫ Pa-5430 Version-
Paloaltonetworks ≫ Pa-5440 Version-
Paloaltonetworks ≫ Pa-5445 Version-
Paloaltonetworks ≫ Pa-5420 Version-
Paloaltonetworks ≫ Pa-5430 Version-
Paloaltonetworks ≫ Pa-5440 Version-
Paloaltonetworks ≫ Pa-5445 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.37% | 0.582 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 7.5 | 3.9 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
psirt@paloaltonetworks.com | 7.5 | 3.9 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
CWE-401 Missing Release of Memory after Effective Lifetime
The product does not sufficiently track and release allocated memory after it has been used, which slowly consumes remaining memory.
CWE-770 Allocation of Resources Without Limits or Throttling
The product allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.