A vulnerability in Palo Alto Networks PAN-OS software enables a remote attacker to reboot PAN-OS firewalls when receiving Windows New Technology LAN Manager (NTLM) packets from Windows servers. Repeated attacks eventually cause the firewall to enter maintenance mode, which requires manual intervention to bring the firewall back online.
                
            Metrics
Affected Vendors & Products
References
        | Link | Providers | 
|---|---|
| https://security.paloaltonetworks.com/CVE-2024-3384 |       | 
History
                    Fri, 24 Jan 2025 16:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Paloaltonetworks Paloaltonetworks pan-os | |
| Weaknesses | NVD-CWE-Other | |
| CPEs | cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:* cpe:2.3:o:paloaltonetworks:pan-os:9.1.15:-:*:*:*:*:*:* | |
| Vendors & Products | Paloaltonetworks Paloaltonetworks pan-os | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: palo_alto
Published: 2024-04-10T17:06:21.704Z
Updated: 2024-08-01T20:12:06.484Z
Reserved: 2024-04-05T17:40:17.390Z
Link: CVE-2024-3384
 Vulnrichment
                        Vulnrichment
                    Updated: 2024-08-01T20:12:06.484Z
 NVD
                        NVD
                    Status : Analyzed
Published: 2024-04-10T17:15:57.217
Modified: 2025-01-24T15:54:56.557
Link: CVE-2024-3384
 Redhat
                        Redhat
                    No data.