By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: Palo Alto Networks warns of DoS bug letting hackers disable firewalls
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > Palo Alto Networks warns of DoS bug letting hackers disable firewalls
Tech News

Palo Alto Networks warns of DoS bug letting hackers disable firewalls

By admin 5 Min Read
Share
SHARE

Palo Alto Networks patched a high-severity vulnerability that could allow unauthenticated attackers to disable firewall protections in denial-of-service (DoS) attacks.

Tracked as CVE-2026-0227, this security flaw affects next-generation firewalls (running PAN-OS 10.1 or later) and Palo Alto Networks’ Prisma Access configurations when the GlobalProtect gateway or portal is enabled.

The cybersecurity company says that most cloud-based Prisma Access instances have already been patched, with those left to be secured already scheduled for an upgrade.

Wiz

“A vulnerability in Palo Alto Networks PAN-OS software enables an unauthenticated attacker to cause a denial of service (DoS) to the firewall. Repeated attempts to trigger this issue results in the firewall entering into maintenance mode,” Palo Alto Networks explained.

“We have successfully completed the Prisma Access upgrade for most of the customers, with the exception of few in progress due to conflicting upgrade schedules. Remaining customers are being promptly scheduled for an upgrade through our standard upgrade process.”

Internet security watchdog Shadowserver currently tracks nearly 6,000 Palo Alto Networks firewalls exposed online, though there is no information on how many have vulnerable configurations or have already been patched.

Palo Alto Networks firewalls exposed online
<em>Palo Alto Networks firewalls exposed online (Shadowserver)</em>

​When the security advisory was published on Wednesday, the company said it had yet to find evidence that this vulnerability was being exploited in attacks.

Palo Alto Networks has released security updates for all affected versions, and admins are advised to upgrade to the latest release to secure their systems against potential attacks.

Version Minor Version Suggested Solution
Cloud NGFW All   No action needed.
PAN-OS 12.1 12.1.0 through 12.1.3 Upgrade to 12.1.4 or later.
PAN-OS 11.2 11.2.8 through 11.2.10 Upgrade to 11.2.10-h2 or later.
  11.2.5 through 11.2.7 Upgrade to 11.2.7-h8 or 11.2.10-h2 or later.
  11.2.0 through 11.2.4 Upgrade to 11.2.4-h15 or 11.2.10-h2 or later.
PAN-OS 11.1 11.1.11 through 11.1.12 Upgrade to 11.1.13 or later.
  11.1.7 through 11.1.10 Upgrade to 11.1.10-h9 or 11.1.13 later.
  11.1.5 through 11.1.6 Upgrade to 11.1.6-h23 or 11.1.13 or later.
  11.1.0 through 11.1.4 Upgrade to 11.1.4-h27 or 11.1.13 or later.
PAN-OS 10.2 10.2.17 through 10.2.18 Upgrade to 10.2.18-h1 or later.
  10.2.14 through 10.2.16 Upgrade to 10.2.16-h6 or 10.2.18-h1 or later.
  10.2.11 through 10.2.13 Upgrade to 10.2.13-h18 or 10.2.18-h1 or later.
  10.2.8 through 10.2.10 Upgrade to 10.2.10-h30 or 10.2.18-h1 or later.
  10.2.0 through 10.2.7 Upgrade to 10.2.7-h32 or 10.2.18-h1 or later.
Unsupported PAN-OS   Upgrade to a supported fixed version.
Prisma Access 11.2 11.2 through Upgrade to 11.2.7-h8 or later.
Prisma Access 10.2 10.2 through Upgrade to 10.2.10-h29 or later.

Palo Alto Networks firewalls are often targeted in attacks, frequently using zero-day vulnerabilities that haven’t been disclosed or patched.

In November 2024, Palo Alto Networks patched two actively exploited PAN-OS firewall zero-days that enabled attackers to gain root privileges. Shadowserver revealed days later that thousands of firewalls had been compromised in the campaign (even though the company said the attacks impacted only “a very small number”), while CISA ordered federal agencies to secure their devices within 3 weeks.

One month later, in December 2024, the cybersecurity firm warned customers that hackers were exploiting another PAN-OS DoS vulnerability (CVE-2024-3393) to target PA-Series, VM-Series, and CN-Series firewalls with DNS Security logging enabled, forcing them to reboot and disable firewall protections.

Soon after, in February, it said three other flaws (CVE-2025-0111, CVE-2025-0108, and CVE-2024-9474) were being chained in attacks to compromise PAN-OS firewalls.

More recently, threat intelligence company GreyNoise warned of an automated campaign targeting Palo Alto GlobalProtect portals with brute-force and login attempts from more than 7,000 IP addresses. GlobalProtect is the VPN and remote access component of PAN-OS firewalls, used by many government agencies, service providers, and large enterprises.

Palo Alto Networks’ products and services are used by over 70,000 customers worldwide, including most of the largest U.S. banks and 90% of Fortune 10 companies.

Wiz

As MCP (Model Context Protocol) becomes the standard for connecting LLMs to tools and data, security teams are moving fast to keep these new services safe.

This free cheat sheet outlines 7 best practices you can start using today.

You Might Also Like

Plans for new Irish supercomputer CASPIR moves to next stage

5 new WhatsApp Features you Should Start Using

10 Hidden iOS 26.4 Features You Should Be Using on Your iPhone

File read flaw in Smart Slider plugin impacts 500K WordPress sites

TeamPCP Hacks Checkmarx GitHub Actions Using Stolen CI Credentials

TAGGED: Denial of Service, DoS, Firewall, Palo Alto Networks, PAN-OS, Vulnerability
Share This Article
Facebook Twitter Copy Link
Previous Article Would you pay for an empty seat? This European budget airline has launched a neighbour-free upgrade
Next Article SpaceX capsule to splash down off California due to medical emergency
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

Breathing danger: WHO identifies world’s most polluted countries and cleanest nations
World News
Plans for new Irish supercomputer CASPIR moves to next stage
Tech News
Oil prices and markets look for direction amid conflicting messages from Iran and the US
Business
MEPs urge Commission leaders to stop Russia from returning to the Venice Biennale
World News
Ripple CEO Says XRP Utility Is Company’s ‘North Star’, Acquisitions Overperforming
Crypto
How Old Was Carolyn Bessette When She Met JFK Jr.? Their Relationship
Celebrity
PS6 Could Still Cost $699 With “Reasonable Subsidy,” Bill of Materials Estimated at $760 – Rumor
Gaming News

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

Investing £5 a day could help me build a second income of £329 a month!

Brussels unveils plans for a European Degree but struggles to explain why

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
Plans for new Irish supercomputer CASPIR moves to next stage
March 29, 2026
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?