- What is the severity of CVE-2024-3393?
- CVE-2024-3393 has been scored as a high severity vulnerability.
- How to fix CVE-2024-3393?
- To fix CVE-2024-3393: This issue is fixed in PAN-OS 10.1.14-h8, PAN-OS 10.2.10-h12, PAN-OS 11.1.5, PAN-OS 11.2.3, and all later PAN-OS versions. Note: PAN-OS 11.0 reached the end of life (EOL) on November 17, 2024, so we do not intend to provide a fix for this release. Prisma Access customers using DNS Security with affected PAN-OS versions should apply one of the workarounds provided below. We will perform upgrades in two phases for impacted customers on the weekends of January 3rd and January 10th. You can request an expedited Prisma Access upgrade to the latest PAN-OS version by opening a support case https://support.paloaltonetworks.com/Support/Index . In addition, to provide the most seamless upgrade path for our customers, we are making fixes available for other TAC-preferred and commonly deployed maintenance releases. Additional PAN-OS 11.1 fixes: * 11.1.2-h16 * 11.1.3-h13 * 11.1.4-h7 * 11.1.5 Additional PAN-OS 10.2 fixes: * 10.2.8-h19 * 10.2.9-h19 * 10.2.10-h12 * 10.2.11-h10 * 10.2.12-h4 * 10.2.13-h2 * 10.2.14 Additional PAN-OS 10.1 fixes: * 10.1.14-h8 * 10.1.15 Additional PAN-OS fixes only applicable to Prisma Access: * 10.2.9-h19 * 10.2.10-h12
- Is CVE-2024-3393 being actively exploited in the wild?
- It is confirmed that CVE-2024-3393 is actively exploited. Be extra cautious if you are using vulnerable components. According to its EPSS score, there is a ~70% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
- What software or system is affected by CVE-2024-3393?
- CVE-2024-3393 affects Palo Alto Networks Cloud NGFW, Palo Alto Networks PAN-OS, Palo Alto Networks PAN-OS.