- Description
- A null pointer dereference vulnerability in Palo Alto Networks PAN-OS software enables an unauthenticated attacker to stop a core system service on the firewall by sending a crafted packet through the data plane that causes a denial of service (DoS) condition. Repeated attempts to trigger this condition result in the firewall entering maintenance mode.
- Source
- psirt@paloaltonetworks.com
- NVD status
- Analyzed
CVSS 4.0
- Type
- Secondary
- Base score
- 8.7
- Impact score
- -
- Exploitability score
- -
- Vector string
- CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:U/V:C/RE:M/U:Amber
- Severity
- HIGH
CVSS 3.1
- Type
- Primary
- Base score
- 7.5
- Impact score
- 3.6
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
- Severity
- HIGH
- Hype score
- Not currently trending
CVE-2024-2551 A null pointer dereference vulnerability in Palo Alto Networks PAN-OS software enables an unauthenticated attacker to stop a core system service on the firewall by send… https://t.co/1Zq3a3b7w3
@CVEnew
14 Nov 2024
25 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[CVE-2024-2551: HIGH] Critical vulnerability in Palo Alto Networks PAN-OS software allows unauthenticated attackers to trigger denial of service via crafted packets, putting firewalls at risk of maintenance mode.#cybersecurity,#vulnerability https://t.co/xZC7B89hhO https://t.co/i
@CveFindCom
14 Nov 2024
10 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "19D52DC1-4441-4C88-B209-9B86FCC2162F",
"versionEndExcluding": "10.1.14",
"versionStartIncluding": "10.1.0"
},
{
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "D61F01F8-1598-4078-9D98-BFF5B62F3BA5",
"versionEndExcluding": "10.2.4",
"versionStartIncluding": "10.2.0"
},
{
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "06B9F11D-D5EF-487A-8E43-9AE14307CCE5",
"versionEndExcluding": "11.0.5",
"versionStartIncluding": "11.0.0"
},
{
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:-:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "135588B5-6771-46A3-98B0-39B4873FD6FD"
},
{
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h2:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "20673F1E-733D-41C4-A644-C482431C26EC"
},
{
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h3:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "156DA55E-4152-47BF-A067-136EEC9ADE22"
},
{
"criteria": "cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h4:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "C2D2F5C4-7ACC-4514-ADBD-3948158B93CC"
}
],
"operator": "OR"
}
]
}
]