CVE-2024-9468
high-risk
Published 2024-10-09
A memory corruption vulnerability in Palo Alto Networks PAN-OS software allows an unauthenticated attacker to crash PAN-OS due to a crafted packet through the data plane, resulting in a denial of service (DoS) condition. Repeated attempts to trigger this condition will result in PAN-OS entering maintenance mode.
Do I need to act?
-
0.60% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10
High
NETWORK
/ LOW complexity
Affected Products (20)
Affected Vendors
References (1)
Vendor Advisory
https://security.paloaltonetworks.com/CVE-2024-9468
55
/ 100
high-risk
Severity
26/34 · High
Exploitability
2/34 · Minimal
Exposure
27/34 · High