#VU100660 NULL pointer dereference in Palo Alto PAN-OS - CVE-2024-2550


Vulnerability identifier: #VU100660

Vulnerability risk: Medium

CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2024-2550

CWE-ID: CWE-476

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Palo Alto PAN-OS
Operating systems & Components / Operating system

Vendor: Palo Alto Networks, Inc.

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error. A remote attacker can send specially crafted packets to the device and crash the GlobalProtect service.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Palo Alto PAN-OS: 10.2, 10.2.0, 10.2.0-h1, 10.2.0-h2, 10.2.0-h3, 10.2.1, 10.2.1-h1, 10.2.1-h2, 10.2.2, 10.2.2-h1, 10.2.2-h2, 10.2.2-h3, 10.2.2-h4, 10.2.2-h5, 10.2.3, 10.2.3-h1, 10.2.3-h2, 10.2.3-h3, 10.2.3-h4, 10.2.3-h5, 10.2.3-h6, 10.2.3-h7, 10.2.3-h8, 10.2.3-h9, 10.2.3-h10, 10.2.3-h11, 10.2.3-h12, 10.2.3-h13, 10.2.4, 10.2.4-h1, 10.2.4-h2, 10.2.4-h3, 10.2.4-h4, 10.2.4-h5, 10.2.4-h6, 10.2.4-h7, 10.2.4-h8, 10.2.4-h9, 10.2.4-h10, 10.2.4-h11, 10.2.4-h12, 10.2.4-h13, 10.2.4-h14, 10.2.4-h15, 10.2.4-h16, 10.2.5, 10.2.5-h1, 10.2.5-h2, 10.2.5-h3, 10.2.5-h4, 10.2.5-h5, 10.2.5-h6, 10.2.6, 10.2.6-h1, 10.2.6-h2, 10.2.6-h3, 10.2.7, 10.2.7-h1, 10.2.7-h2, 10.2.7-h3, 10.2.7-h4, 10.2.7-h5, 10.2.7-h6, 10.2.7-h7, 10.2.7-h8, 10.2.7-h9, 10.2.7-h10, 10.2.7-h11, 10.2.7-h12, 10.2.7-h13, 10.2.7-h14, 10.2.7-h15, 10.2.7-h16, 10.2.8, 10.2.8-h1, 10.2.8-h3, 10.2.8-h4, 10.2.8-h10, 10.2.8-h13, 10.2.9, 10.2.9-h1, 10.2.9-h2, 10.2.9-h3, 10.2.9-h4, 10.2.9-h5, 10.2.9-h6, 10.2.9-h7, 10.2.9-h8, 10.2.9-h9, 10.2.9-h10, 10.2.9-h11, 10.2.9-14, 10.2.10, 10.2.10-h1, 10.2.10-h2, 10.2.10-h3, 10.2.10-h4, 10.2.10-h7, 11.0, 11.0.0, 11.0.0-h1, 11.0.0-h2, 11.0.0-h3, 11.0.1, 11.0.1-h1, 11.0.1-h2, 11.0.1-h3, 11.0.1-h4, 11.0.2, 11.0.2-h1, 11.0.2-h2, 11.0.2-h3, 11.0.2-h4, 11.0.3, 11.0.3-h1, 11.0.3-h2, 11.0.3-h3, 11.0.3-h4, 11.0.3-h5, 11.0.3-h6, 11.0.3-h7, 11.0.3-h8, 11.0.3-h9, 11.0.3-h10, 11.0.3-h11, 11.0.3-h12, 11.0.4, 11.0.4-h1, 11.0.4-h2, 11.0.4-h3, 11.0.4-h4, 11.0.4-h5, 11.0.5, 11.0.5-h1, 11.1, 11.1.0, 11.1.0-h1, 11.1.0-h2, 11.1.0-h3, 11.1.1, 11.1.1-h1, 11.1.2, 11.1.2-h1, 11.1.2-h2, 11.1.2-h3, 11.1.2-h4, 11.1.2-h9, 11.1.2-h12, 11.1.2-h14, 11.1.3, 11.1.3-h2, 11.1.3-h4, 11.1.3-h6, 11.1.3-h10, 11.1.4, 11.1.4-h1, 11.1.4-h2, 11.1.4-h3, 11.1.4-h4, 11.1.5-h1


External links
https://security.paloaltonetworks.com/CVE-2024-2550


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability