8.2

CVE-2024-9468

A memory corruption vulnerability in Palo Alto Networks PAN-OS software allows an unauthenticated attacker to crash PAN-OS due to a crafted packet through the data plane, resulting in a denial of service (DoS) condition. Repeated attempts to trigger this condition will result in PAN-OS entering maintenance mode.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
PaloaltonetworksPan-os Version >= 10.2.0 < 10.2.4
PaloaltonetworksPan-os Version >= 10.2.5 < 10.2.7
PaloaltonetworksPan-os Version >= 11.0.0 < 11.0.4
PaloaltonetworksPan-os Version >= 11.0.5 < 11.0.6
PaloaltonetworksPan-os Version >= 11.1.0 < 11.1.3
PaloaltonetworksPan-os Version10.2.4 Update-
PaloaltonetworksPan-os Version10.2.4 Updateh10
PaloaltonetworksPan-os Version10.2.4 Updateh16
PaloaltonetworksPan-os Version10.2.4 Updateh2
PaloaltonetworksPan-os Version10.2.4 Updateh3
PaloaltonetworksPan-os Version10.2.4 Updateh4
PaloaltonetworksPan-os Version10.2.7 Update-
PaloaltonetworksPan-os Version10.2.7 Updateh1
PaloaltonetworksPan-os Version10.2.7 Updateh10
PaloaltonetworksPan-os Version10.2.7 Updateh11
PaloaltonetworksPan-os Version10.2.7 Updateh12
PaloaltonetworksPan-os Version10.2.7 Updateh13
PaloaltonetworksPan-os Version10.2.7 Updateh14
PaloaltonetworksPan-os Version10.2.7 Updateh15
PaloaltonetworksPan-os Version10.2.7 Updateh16
PaloaltonetworksPan-os Version10.2.7 Updateh17
PaloaltonetworksPan-os Version10.2.7 Updateh18
PaloaltonetworksPan-os Version10.2.7 Updateh19
PaloaltonetworksPan-os Version10.2.7 Updateh2
PaloaltonetworksPan-os Version10.2.7 Updateh20
PaloaltonetworksPan-os Version10.2.7 Updateh21
PaloaltonetworksPan-os Version10.2.7 Updateh22
PaloaltonetworksPan-os Version10.2.7 Updateh23
PaloaltonetworksPan-os Version10.2.8 Update-
PaloaltonetworksPan-os Version10.2.8 Updateh1
PaloaltonetworksPan-os Version10.2.8 Updateh10
PaloaltonetworksPan-os Version10.2.8 Updateh11
PaloaltonetworksPan-os Version10.2.8 Updateh12
PaloaltonetworksPan-os Version10.2.8 Updateh13
PaloaltonetworksPan-os Version10.2.8 Updateh14
PaloaltonetworksPan-os Version10.2.8 Updateh15
PaloaltonetworksPan-os Version10.2.8 Updateh16
PaloaltonetworksPan-os Version10.2.8 Updateh17
PaloaltonetworksPan-os Version10.2.8 Updateh18
PaloaltonetworksPan-os Version10.2.8 Updateh19
PaloaltonetworksPan-os Version10.2.8 Updateh2
PaloaltonetworksPan-os Version10.2.8 Updateh3
PaloaltonetworksPan-os Version10.2.8 Updateh4
PaloaltonetworksPan-os Version10.2.8 Updateh5
PaloaltonetworksPan-os Version10.2.8 Updateh6
PaloaltonetworksPan-os Version10.2.8 Updateh7
PaloaltonetworksPan-os Version10.2.8 Updateh8
PaloaltonetworksPan-os Version10.2.8 Updateh9
PaloaltonetworksPan-os Version10.2.9 Update-
PaloaltonetworksPan-os Version10.2.9 Updateh1
PaloaltonetworksPan-os Version10.2.9 Updateh2
PaloaltonetworksPan-os Version10.2.9 Updateh3
PaloaltonetworksPan-os Version10.2.9 Updateh4
PaloaltonetworksPan-os Version10.2.9 Updateh5
PaloaltonetworksPan-os Version10.2.9 Updateh6
PaloaltonetworksPan-os Version10.2.9 Updateh7
PaloaltonetworksPan-os Version10.2.9 Updateh8
PaloaltonetworksPan-os Version10.2.9 Updateh9
PaloaltonetworksPan-os Version10.2.10 Update-
PaloaltonetworksPan-os Version10.2.10 Updateh1
PaloaltonetworksPan-os Version10.2.10 Updateh2
PaloaltonetworksPan-os Version10.2.10 Updateh3
PaloaltonetworksPan-os Version11.0.4 Update-
PaloaltonetworksPan-os Version11.0.4 Updateh1
PaloaltonetworksPan-os Version11.0.4 Updateh2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.6% 0.688
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
psirt@paloaltonetworks.com 8.2 0 0
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:U/V:C/RE:L/U:Amber
CWE-787 Out-of-bounds Write

The product writes data past the end, or before the beginning, of the intended buffer.