Vulnerability Name:

CVE-2022-0023 (CCN-224152)

Assigned:2021-12-28
Published:2022-04-13
Updated:2022-10-18
Summary:An improper handling of exceptional conditions vulnerability exists in the DNS proxy feature of Palo Alto Networks PAN-OS software that enables a meddler-in-the-middle (MITM) to send specifically crafted traffic to the firewall that causes the service to restart unexpectedly. Repeated attempts to send this request result in denial-of-service to all PAN-OS services by restarting the device in maintenance mode. This issue does not impact Panorama appliances and Prisma Access customers. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.22; PAN-OS 9.0 versions earlier than PAN-OS 9.0.16; PAN-OS 9.1 versions earlier than PAN-OS 9.1.13; PAN-OS 10.0 versions earlier than PAN-OS 10.0.10; PAN-OS 10.1 versions earlier than PAN-OS 10.1.5. This issue does not impact PAN-OS 10.2.
CVSS v3 Severity:5.9 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)
5.2 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
5.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)
5.2 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
CVSS v2 Severity:4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
5.4 Medium (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:N/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
Vulnerability Type:CWE-755
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2022-0023

Source: XF
Type: UNKNOWN
paloalto-cve20220023-dos(224152)

Source: CCN
Type: Palo Alto Networks Security Advisories
CVE-2022-0023 PAN-OS: Denial-of-Service (DoS) Vulnerability in DNS Proxy

Source: MISC
Type: Vendor Advisory
https://security.paloaltonetworks.com/CVE-2022-0023

Vulnerable Configuration:Configuration 1:
  • cpe:/o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:* (Version >= 10.0.0 and < 10.0.10)
  • OR cpe:/o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:* (Version >= 9.1.0 and < 9.1.13)
  • OR cpe:/o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:* (Version >= 9.0.0 and < 9.0.16)
  • OR cpe:/o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:* (Version >= 8.1.0 and < 8.1.22)
  • OR cpe:/o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:* (Version >= 10.1.0 and < 10.1.5)

  • Configuration CCN 1:
  • cpe:/o:paloaltonetworks:pan-os:8.1.1:*:*:*:*:*:*:*
  • OR cpe:/o:paloaltonetworks:pan-os:8.1.5:*:*:*:*:*:*:*
  • OR cpe:/o:paloaltonetworks:pan-os:8.1.6:-:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    paloaltonetworks pan-os *
    paloaltonetworks pan-os *
    paloaltonetworks pan-os *
    paloaltonetworks pan-os *
    paloaltonetworks pan-os *
    paloaltonetworks pan-os 8.1.1
    paloaltonetworks pan-os 8.1.5
    paloaltonetworks pan-os 8.1.6 -