CVE detail
CVE-2024-3393: Palo Alto Networks PAN-OS Malicious DNS Packet Vulnerability
Source: CISA Known Exploited Vulnerabilities catalog · back to feed
Vendor / product
Palo Alto Networks · PAN-OS
- Date added (KEV)
- Dec 30, 2024
- CISA due date
- Jan 20, 2025
- Ransomware campaign use
- Unknown
Required action
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Vendor fix: Vendor advisory
Scorifya interpretation
AI-generatedA short, structured read of the record above — generated when this page first loads, then cached for a week.
Plain English
Technical detail
From CISA
Palo Alto Networks PAN-OS contains a vulnerability in parsing and logging malicious DNS packets in the DNS Security feature that, when exploited, allows an unauthenticated attacker to remotely reboot the firewall. Repeated attempts to trigger this condition will cause the firewall to enter maintenance mode.
https://security.paloaltonetworks.com/CVE-2024-3393 ; https://nvd.nist.gov/vuln/detail/CVE-2024-3393
References
- https://security.paloaltonetworks.com/CVE-2024-3393Vendor Advisory
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-3393US Government Resource
Other recent CVEs from Palo Alto Networks
- CVE-2026-0300PAN-OS — Palo Alto Networks PAN-OS Out-of-bounds Write Vulnerability
- CVE-2025-0111PAN-OS — Palo Alto Networks PAN-OS File Read Vulnerability
- CVE-2025-0108PAN-OS — Palo Alto Networks PAN-OS Authentication Bypass Vulnerability
- CVE-2024-0012PAN-OS — Palo Alto Networks PAN-OS Management Interface Authentication Bypass Vulnerability
- CVE-2024-9474PAN-OS — Palo Alto Networks PAN-OS Management Interface OS Command Injection Vulnerability
Check your domain's public posture
Scorifya doesn't test for specific CVEs, but if patching Palo Alto Networks changed your headers or TLS, a fresh hardening scan helps confirm nothing regressed externally.