### [CVE-2022-0023](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0023) ![](https://img.shields.io/static/v1?label=Product&message=PAN-OS&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Prisma%20Access&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=3.0!%20Preferred%2C%20Innovation%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Version&message=8.1%3C%208.1.22%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-755%20Improper%20Handling%20of%20Exceptional%20Conditions&color=brighgreen) ### Description An improper handling of exceptional conditions vulnerability exists in the DNS proxy feature of Palo Alto Networks PAN-OS software that enables a meddler-in-the-middle (MITM) to send specifically crafted traffic to the firewall that causes the service to restart unexpectedly. Repeated attempts to send this request result in denial-of-service to all PAN-OS services by restarting the device in maintenance mode. This issue does not impact Panorama appliances and Prisma Access customers. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.22; PAN-OS 9.0 versions earlier than PAN-OS 9.0.16; PAN-OS 9.1 versions earlier than PAN-OS 9.1.13; PAN-OS 10.0 versions earlier than PAN-OS 10.0.10; PAN-OS 10.1 versions earlier than PAN-OS 10.1.5. This issue does not impact PAN-OS 10.2. ### POC #### Reference No PoCs from references. #### Github - https://github.com/karimhabush/cyberowl