Palo Alto Networks Fixes Firewall DoS Vulnerability

Palo Alto Networks Fixes Firewall DoS Vulnerability

Palo Alto Networks has released security updates to fix a denial-of-service (DoS) vulnerability in its PAN-OS firewall software. The issue, tracked as CVE-2026-0227, could allow unauthenticated attackers to disrupt GlobalProtect gateways and portals, forcing affected firewalls into maintenance mode.

The vulnerability has a CVSS v4.0 score of 7.7 (High severity) and was publicly disclosed on January 14, 2026. Palo Alto Networks confirmed that Cloud NGFW is not affected, but several on-premise and Prisma Access deployments are impacted.

What Is the Issue?

The flaw is caused by improper handling of unexpected conditions in PAN-OS. By repeatedly triggering the issue over the network, an attacker can cause the firewall to enter maintenance mode, resulting in a service outage.

No authentication, user interaction, or special privileges are required, making the attack low complexity and easy to automate. While the issue affects availability, it does not impact data confidentiality or integrity.

Palo Alto Networks has confirmed that proof-of-concept (PoC) code exists, although there is currently no evidence of active exploitation.

When Are Systems at Risk?

Systems are vulnerable if GlobalProtect gateways or portals are enabled, which is common in environments that support remote access. The issue affects multiple PAN-OS versions across both legacy and current branches.

Affected and Fixed Versions

ProductAffected VersionsFixed Versions
PAN-OS 12.1Earlier than 12.1.3-h3, 12.1.412.1.3-h3, 12.1.4
PAN-OS 11.2Earlier than 11.2.4-h15, 11.2.7-h8, 11.2.10-h211.2.4-h15, 11.2.7-h8, 11.2.10-h2
PAN-OS 11.1Earlier than 11.1.4-h27, 11.1.6-h23, 11.1.10-h9, 11.1.13Patched releases listed
PAN-OS 10.2Earlier than 10.2.7-h32 through 10.2.18-h1Corresponding hotfixes
PAN-OS 10.1Earlier than 10.1.14-h2010.1.14-h20
Prisma Access 11.2Earlier than 11.2.7-h811.2.7-h8
Prisma Access 10.2Earlier than 10.2.10-h2910.2.10-h29

What Should Administrators Do?

Palo Alto Networks recommends upgrading immediately, as no workaround is available for this vulnerability. Administrators should move to the latest hotfix releases, such as PAN-OS 12.1.4 or 11.2.10-h2, depending on their deployment.

Organizations are also advised to:

  • Review GlobalProtect configurations
  • Monitor firewall logs for repeated connection attempts
  • Watch for signs of DoS activity while PoC code is publicly available

‍Follow Us on: Linkedin, InstagramFacebook to get the latest security news!

About the Author:

FirstHackersNews- Identifies Security

Leave A Comment

Subscribe to our newsletter to receive security tips everday!