Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/waived/cve-2024-3393
PAN-OS: Firewall Denial-of-Service exploit via malicious DNS query
https://github.com/waived/cve-2024-3393
cve-2024-3393 denial-of-service dns-attack exploit palo-alto-networks pan-os proof-of-concept python3
Last synced: 20 days ago
JSON representation
PAN-OS: Firewall Denial-of-Service exploit via malicious DNS query
- Host: GitHub
- URL: https://github.com/waived/cve-2024-3393
- Owner: waived
- Created: 2025-01-09T22:03:07.000Z (26 days ago)
- Default Branch: main
- Last Pushed: 2025-01-09T22:05:18.000Z (26 days ago)
- Last Synced: 2025-01-09T23:18:33.710Z (26 days ago)
- Topics: cve-2024-3393, denial-of-service, dns-attack, exploit, palo-alto-networks, pan-os, proof-of-concept, python3
- Language: Python
- Homepage:
- Size: 106 KB
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.txt
Awesome Lists containing this project
README
////////////////////////////////////////
/// CVE-2024-3393 - PROOF-OF-CONCEPT ///
/// Palo-Alto Firewall DoS Exploit ///
////////////////////////////////////////Description:
Simple POC (proof of concept) script that aims to attack
the Firewall on certain vulnerable versions of Palo Alto's
PAN OS via malicious DNS queries. A successful attack will
force the firewall to crash and enter "maintenance mode."
Although a single malicious DNS request can cause the fire-
wall to crash, a second or more requests may be required in
order for this attack to be successful. This POC will send
a user-specified volley of packets in order to acount for this.Resources:
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-3393
- https://security.paloaltonetworks.com/CVE-2024-3393
- https://nvd.nist.gov/vuln/detail/CVE-2024-3393
Risk Assessment:
┌───────────────┬──────────────────────┬──────────────────────┐
│ VERSIONS │ AFFECTED | SAFE │
├───────────────┼──────────────────────┼──────────────────────┤
│ Cloud NGFW │ None │ All │
├───────────────┼──────────────────────┼──────────────────────┤
│ PAN-OS 11.2 │ <11.2.3 │ >=11.2.3* │
├───────────────┼──────────────────────┼──────────────────────┤
│ PAN-OS 11.1 │ <11.1.5 │ >=11.1.5* │
├───────────────┼──────────────────────┼──────────────────────┤
│ PAN-OS 10.2 │ >=10.2.8*, <10.2.14 │ <10.2.8*, >=10.2.14* │
├───────────────┼──────────────────────┼──────────────────────┤
│ PAN-OS 10.1 │ >=10.1.14*, <10.1.15 │ <10.1.14*, >=10.1.15 │
├───────────────┼──────────────────────┼──────────────────────┤
│ PAN-OS 10.0 │ None │ All │
├───────────────┼──────────────────────┼──────────────────────┤
│ PAN-OS 9.1 │ None │ All │
├───────────────┼──────────────────────┼──────────────────────┤
│ Prisma Access │ >=10.2.8, <11.2.3 │ <10.2.8*, >=11.2.3 │
└───────────────┴──────────────────────┴──────────────────────┘