INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global data_breach Multiple sectors HIGH 57m Global vulnerability Government and Critical Infrastructure CRITICAL 1h Global vulnerability Multiple sectors CRITICAL 1h Global apt Financial Services, Government HIGH 1h Global insider Cross-sector CRITICAL 2h Global vulnerability Multiple sectors CRITICAL 2h Global vulnerability Information Technology / Software Infrastructure CRITICAL 2h Global data_breach Healthcare CRITICAL 2h Global malware Financial Services HIGH 2h Global vulnerability Technology/Software Development HIGH 3h Global data_breach Multiple sectors HIGH 57m Global vulnerability Government and Critical Infrastructure CRITICAL 1h Global vulnerability Multiple sectors CRITICAL 1h Global apt Financial Services, Government HIGH 1h Global insider Cross-sector CRITICAL 2h Global vulnerability Multiple sectors CRITICAL 2h Global vulnerability Information Technology / Software Infrastructure CRITICAL 2h Global data_breach Healthcare CRITICAL 2h Global malware Financial Services HIGH 2h Global vulnerability Technology/Software Development HIGH 3h Global data_breach Multiple sectors HIGH 57m Global vulnerability Government and Critical Infrastructure CRITICAL 1h Global vulnerability Multiple sectors CRITICAL 1h Global apt Financial Services, Government HIGH 1h Global insider Cross-sector CRITICAL 2h Global vulnerability Multiple sectors CRITICAL 2h Global vulnerability Information Technology / Software Infrastructure CRITICAL 2h Global data_breach Healthcare CRITICAL 2h Global malware Financial Services HIGH 2h Global vulnerability Technology/Software Development HIGH 3h
Vulnerabilities

CVE-2024-3393

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
Palo Alto Networks PAN-OS Malicious DNS Packet Vulnerability — Palo Alto Networks PAN-OS contains a vulnerability in parsing and logging malicious DNS packets in the DNS Security feature that, when ex
Published: Dec 30, 2024  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

Palo Alto Networks PAN-OS Malicious DNS Packet Vulnerability — Palo Alto Networks PAN-OS contains a vulnerability in parsing and logging malicious DNS packets in the DNS Security feature that, when exploited, allows an unauthenticated attacker to remotely reboot the firewall. Repeated attempts to trigger this condition will cause the firewall to enter maintenance mode.

🤖 AI Executive Summary

Palo Alto Networks PAN-OS contains a critical vulnerability in DNS Security feature that allows unauthenticated attackers to remotely reboot firewalls via malicious DNS packets. Repeated exploitation can force firewalls into maintenance mode, causing denial of service.

📄 Description (Arabic)

تؤثر هذه الثغرة على ميزة أمان DNS في Palo Alto Networks PAN-OS وتسمح بإعادة تشغيل بعيدة غير مصرح بها للجهاز. يمكن للمهاجمين إرسال حزم DNS ضارة مصممة خصيصاً لتشغيل الثغرة دون الحاجة إلى بيانات اعتماد. الاستغلال المتكرر يؤدي إلى دخول جدار الحماية في وضع الصيانة مما يعطل الخدمات الحرجة.

🤖 ملخص تنفيذي (AI)

Palo Alto Networks PAN-OS يحتوي على ثغرة حرجة في ميزة أمان DNS تسمح للمهاجمين غير المصرحين بإعادة تشغيل جدران الحماية عن بعد عبر حزم DNS ضارة. يمكن للاستغلال المتكرر فرض جدران الحماية في وضع الصيانة مما يسبب رفض الخدمة.

🤖 AI Intelligence Analysis Analyzed: Apr 19, 2026 12:21
🇸🇦 Saudi Arabia Impact Assessment
Saudi Relevance: high
🏢 Affected Saudi Sectors
banking telecom energy government healthcare
🎯 MITRE ATT&CK Techniques
⚖️ Saudi Risk Score (AI)
9.0
/ 10.0
🔧 Remediation Steps (English)
Immediately update Palo Alto Networks PAN-OS to the latest patched version. Implement network segmentation to restrict DNS traffic sources. Monitor firewall logs for malicious DNS packet patterns. Disable DNS Security feature if not critical until patched. Establish firewall redundancy to maintain service availability during incidents.
🔧 خطوات المعالجة (العربية)
قم بتحديث Palo Alto Networks PAN-OS فوراً إلى أحدث إصدار مصحح. طبق تقسيم الشبكة لتقييد مصادر حركة DNS. راقب سجلات جدار الحماية للكشف عن أنماط حزم DNS الضارة. عطل ميزة أمان DNS إذا لم تكن حرجة حتى يتم إصلاحها. أنشئ تكرار جدار الحماية للحفاظ على توفر الخدمة أثناء الحوادث.
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC-1.1 ECC-2.1 ECC-3.1 ECC-4.1
🔵 SAMA CSF
ID.BE-5 PR.DS-4 PR.PT-1 DE.AE-1 RS.MI-2
🟡 ISO 27001:2022
A.12.6.1 A.14.2.1 A.16.1.5
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
Palo Alto Networks:PAN-OS
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS78.02%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2025-01-20
Published 2024-12-30
Source Feed cisa_kev
Views 1
🇸🇦 Saudi Risk Score
9.0
/ 10.0 — Saudi Risk
Priority: CRITICAL
🏷️ Tags
kev actively-exploited
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.