CVE-2021-3053
PAN-OS: Exceptional Condition Denial-of-Service (DoS)
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
An improper handling of exceptional conditions vulnerability exists in the Palo Alto Networks PAN-OS dataplane that enables an unauthenticated network-based attacker to send specifically crafted traffic through the firewall that causes the service to crash. Repeated attempts to send this request result in denial of service to all PAN-OS services by restarting the device and putting it into maintenance mode. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.20; PAN-OS 9.0 versions earlier than PAN-OS 9.0.14; PAN-OS 9.1 versions earlier than PAN-OS 9.1.9; PAN-OS 10.0 versions earlier than PAN-OS 10.0.5. This issue does not affect Prisma Access.
Se presenta una vulnerabilidad de administración inapropiada de condiciones excepcionales en el plano de datos de PAN-OS de Palo Alto Networks que permite a un atacante no autenticado basado en la red enviar tráfico específicamente diseñado mediante el firewall que causa un bloqueo del servicio. Los intentos repetidos de enviar esta petición resultan en una denegación de servicio de todos los servicios de PAN-OS, al reiniciar el dispositivo y poniéndolo en modo de mantenimiento. Este problema afecta a: PAN-OS versión 8.1 anteriores a PAN-OS versión 8.1.20; PAN-OS versión 9.0 anteriores a PAN-OS versión 9.0.14; PAN-OS versión 9.1 anteriores a PAN-OS versión 9.1.9; PAN-OS versión 10.0 anteriores a PAN-OS versión 10.0.5. Este problema no afecta a Prisma Access
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-01-06 CVE Reserved
- 2021-09-08 CVE Published
- 2024-05-24 EPSS Updated
- 2024-09-16 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-755: Improper Handling of Exceptional Conditions
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://security.paloaltonetworks.com/CVE-2021-3053 | 2021-09-15 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Paloaltonetworks Search vendor "Paloaltonetworks" | Pan-os Search vendor "Paloaltonetworks" for product "Pan-os" | >= 8.1.0 < 8.1.20 Search vendor "Paloaltonetworks" for product "Pan-os" and version " >= 8.1.0 < 8.1.20" | - |
Affected
| ||||||
Paloaltonetworks Search vendor "Paloaltonetworks" | Pan-os Search vendor "Paloaltonetworks" for product "Pan-os" | >= 9.0.0 < 9.0.14 Search vendor "Paloaltonetworks" for product "Pan-os" and version " >= 9.0.0 < 9.0.14" | - |
Affected
| ||||||
Paloaltonetworks Search vendor "Paloaltonetworks" | Pan-os Search vendor "Paloaltonetworks" for product "Pan-os" | >= 9.1.0 < 9.1.9 Search vendor "Paloaltonetworks" for product "Pan-os" and version " >= 9.1.0 < 9.1.9" | - |
Affected
| ||||||
Paloaltonetworks Search vendor "Paloaltonetworks" | Pan-os Search vendor "Paloaltonetworks" for product "Pan-os" | >= 10.0.0 < 10.0.5 Search vendor "Paloaltonetworks" for product "Pan-os" and version " >= 10.0.0 < 10.0.5" | - |
Affected
|