2024-11-14 11:03:59 +00:00
{
"id" : "CVE-2024-2551" ,
"sourceIdentifier" : "psirt@paloaltonetworks.com" ,
"published" : "2024-11-14T10:15:04.547" ,
2025-01-24 17:03:56 +00:00
"lastModified" : "2025-01-24T16:03:41.910" ,
"vulnStatus" : "Analyzed" ,
2024-11-14 11:03:59 +00:00
"cveTags" : [ ] ,
"descriptions" : [
{
"lang" : "en" ,
"value" : "A null pointer dereference vulnerability in Palo Alto Networks PAN-OS software enables an unauthenticated attacker to stop a core system service on the firewall by sending a crafted packet through the data plane that causes a denial of service (DoS) condition. Repeated attempts to trigger this condition result in the firewall entering maintenance mode."
2024-11-15 15:03:34 +00:00
} ,
{
"lang" : "es" ,
"value" : "Una vulnerabilidad de desreferencia de puntero nulo en el software PAN-OS de Palo Alto Networks permite a un atacante no autenticado detener un servicio central del sistema en el firewall mediante el env\u00edo de un paquete manipulado a trav\u00e9s del plano de datos que provoca una condici\u00f3n de denegaci\u00f3n de servicio (DoS). Los intentos repetidos de activar esta condici\u00f3n hacen que el firewall entre en modo de mantenimiento."
2024-11-14 11:03:59 +00:00
}
] ,
"metrics" : {
"cvssMetricV40" : [
{
"source" : "psirt@paloaltonetworks.com" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "4.0" ,
"vectorString" : "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:U/V:C/RE:M/U:Amber" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 8.7 ,
"baseSeverity" : "HIGH" ,
2024-11-14 11:03:59 +00:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"attackRequirements" : "NONE" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"vulnerableSystemConfidentiality" : "NONE" ,
"vulnerableSystemIntegrity" : "NONE" ,
"vulnerableSystemAvailability" : "HIGH" ,
"subsequentSystemConfidentiality" : "NONE" ,
"subsequentSystemIntegrity" : "NONE" ,
"subsequentSystemAvailability" : "NONE" ,
"exploitMaturity" : "NOT_DEFINED" ,
"confidentialityRequirements" : "NOT_DEFINED" ,
"integrityRequirements" : "NOT_DEFINED" ,
"availabilityRequirements" : "NOT_DEFINED" ,
"modifiedAttackVector" : "NOT_DEFINED" ,
"modifiedAttackComplexity" : "NOT_DEFINED" ,
"modifiedAttackRequirements" : "NOT_DEFINED" ,
"modifiedPrivilegesRequired" : "NOT_DEFINED" ,
"modifiedUserInteraction" : "NOT_DEFINED" ,
"modifiedVulnerableSystemConfidentiality" : "NOT_DEFINED" ,
"modifiedVulnerableSystemIntegrity" : "NOT_DEFINED" ,
"modifiedVulnerableSystemAvailability" : "NOT_DEFINED" ,
"modifiedSubsequentSystemConfidentiality" : "NOT_DEFINED" ,
"modifiedSubsequentSystemIntegrity" : "NOT_DEFINED" ,
"modifiedSubsequentSystemAvailability" : "NOT_DEFINED" ,
"safety" : "NOT_DEFINED" ,
"automatable" : "NO" ,
"recovery" : "USER" ,
"valueDensity" : "CONCENTRATED" ,
"vulnerabilityResponseEffort" : "MODERATE" ,
2024-12-08 03:06:42 +00:00
"providerUrgency" : "AMBER"
2024-11-14 11:03:59 +00:00
}
}
2025-01-24 17:03:56 +00:00
] ,
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" ,
"baseScore" : 7.5 ,
"baseSeverity" : "HIGH" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
"availabilityImpact" : "HIGH"
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 3.6
}
2024-11-14 11:03:59 +00:00
]
} ,
"weaknesses" : [
{
"source" : "psirt@paloaltonetworks.com" ,
"type" : "Secondary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-476"
}
]
2025-01-24 17:03:56 +00:00
} ,
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-476"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "10.1.0" ,
"versionEndExcluding" : "10.1.14" ,
"matchCriteriaId" : "19D52DC1-4441-4C88-B209-9B86FCC2162F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "10.2.0" ,
"versionEndExcluding" : "10.2.4" ,
"matchCriteriaId" : "D61F01F8-1598-4078-9D98-BFF5B62F3BA5"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "11.0.0" ,
"versionEndExcluding" : "11.0.5" ,
"matchCriteriaId" : "06B9F11D-D5EF-487A-8E43-9AE14307CCE5"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:-:*:*:*:*:*:*" ,
"matchCriteriaId" : "135588B5-6771-46A3-98B0-39B4873FD6FD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h2:*:*:*:*:*:*" ,
"matchCriteriaId" : "20673F1E-733D-41C4-A644-C482431C26EC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h3:*:*:*:*:*:*" ,
"matchCriteriaId" : "156DA55E-4152-47BF-A067-136EEC9ADE22"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.4:h4:*:*:*:*:*:*" ,
"matchCriteriaId" : "C2D2F5C4-7ACC-4514-ADBD-3948158B93CC"
}
]
}
]
2024-11-14 11:03:59 +00:00
}
] ,
"references" : [
{
"url" : "https://security.paloaltonetworks.com/CVE-2024-2551" ,
2025-01-24 17:03:56 +00:00
"source" : "psirt@paloaltonetworks.com" ,
"tags" : [
"Vendor Advisory"
]
2024-11-14 11:03:59 +00:00
}
]
}