Palo Alto Fixes GlobalProtect DoS Flaw That Can Crash Firewalls Without Login
嗯,用户让我总结一篇文章的内容,控制在一百个字以内,而且不需要用特定的开头。首先,我需要仔细阅读文章,抓住主要信息。 文章是关于Palo Alto Networks发布安全更新,修复了一个高危漏洞CVE-2026-0227。这个漏洞影响GlobalProtect Gateway和Portal,CVSS评分为7.7,属于拒绝服务攻击。攻击者无需认证就能触发漏洞,导致防火墙进入维护模式。 漏洞是由外部研究人员发现的,影响多个版本的PAN-OS和Prisma Access软件。修复建议是升级到指定版本,并提到没有旁路解决方法。虽然目前没有证据显示漏洞被利用,但建议用户保持设备更新。 接下来,我需要把这些信息浓缩到100字以内。要突出漏洞的严重性、影响范围、修复措施以及建议。同时避免使用复杂的术语,让总结清晰易懂。 可能的结构:公司名称、漏洞名称、影响范围、攻击方式、后果、修复建议和注意事项。 现在开始组织语言:Palo Alto Networks修复了GlobalProtect中的高危漏洞CVE-2026-0227,可能导致DoS攻击和维护模式。影响多个软件版本,建议升级以缓解风险。 这样大概在100字左右,并且直接描述了内容。 </think> Palo Alto Networks修复了GlobalProtect中的高危漏洞CVE-2026-0227,可能导致DoS攻击和维护模式。该漏洞影响多个PAN-OS和Prisma Access版本,建议用户升级以缓解风险。 2026-1-15 08:18:0 Author: thehackernews.com(查看原文) 阅读量:0 收藏

Network Security / Vulnerability

Palo Alto Networks has released security updates for a high-severity security flaw impacting GlobalProtect Gateway and Portal, for which it said there exists a proof-of-concept (PoC) exploit.

The vulnerability, tracked as CVE-2026-0227 (CVSS score: 7.7), has been described as a denial-of-service (DoS) condition impacting GlobalProtect PAN-OS software arising as a result of an improper check for exceptional conditions (CWE-754)

"A vulnerability in Palo Alto Networks PAN-OS software enables an unauthenticated attacker to cause a denial-of-service (DoS) to the firewall," the company said in an advisory released Wednesday. "Repeated attempts to trigger this issue result in the firewall entering into maintenance mode."

The issue, discovered and reported by an unnamed external researcher, affects the following versions -

  • PAN-OS 12.1 < 12.1.3-h3, < 12.1.4
  • PAN-OS 11.2 < 11.2.4-h15, < 11.2.7-h8, < 11.2.10-h2
  • PAN-OS 11.1 < 11.1.4-h27, < 11.1.6-h23, < 11.1.10-h9, < 11.1.13
  • PAN-OS 10.2 < 10.2.7-h32, < 10.2.10-h30, < 10.2.13-h18, < 10.2.16-h6, < 10.2.18-h1
  • PAN-OS 10.1 < 10.1.14-h20
  • Prisma Access 11.2 < 11.2.7-h8
  • Prisma Access 10.2 < 10.2.10-h29
Cybersecurity

Palo Alto Networks also clarified that the vulnerability is applicable only to PAN-OS NGFW or Prisma Access configurations with an enabled GlobalProtect gateway or portal. The company's Cloud Next-Generation Firewall (NGFW) is not impacted. There are no workarounds to mitigate the flaw.

While there is no evidence that the vulnerability has been exploited in the wild, it's essential to keep the devices up-to-date, especially given that exposed GlobalProtect gateways have witnessed repeated scanning activity over the past year.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/01/palo-alto-fixes-globalprotect-dos-flaw.html
如有侵权请联系:admin#unsafe.sh