A null pointer dereference vulnerability in Palo Alto Networks PAN-OS software enables an unauthenticated attacker to stop a core system service on the firewall by sending a crafted packet through the data plane that causes a denial of service (DoS) condition. Repeated attempts to trigger this condition result in the firewall entering maintenance mode.
A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Pan-os | Paloaltonetworks | 10.1.0 (including) | 10.1.14 (excluding) |
Pan-os | Paloaltonetworks | 10.2.0 (including) | 10.2.4 (excluding) |
Pan-os | Paloaltonetworks | 11.0.0 (including) | 11.0.5 (excluding) |
Pan-os | Paloaltonetworks | 10.2.4 (including) | 10.2.4 (including) |
Pan-os | Paloaltonetworks | 10.2.4-h2 (including) | 10.2.4-h2 (including) |
Pan-os | Paloaltonetworks | 10.2.4-h3 (including) | 10.2.4-h3 (including) |
Pan-os | Paloaltonetworks | 10.2.4-h4 (including) | 10.2.4-h4 (including) |