CVE-2024-3382 Overview
A memory leak vulnerability exists in Palo Alto Networks PAN-OS software that enables an attacker to send a burst of crafted packets through the firewall, eventually preventing the firewall from processing traffic. This denial of service vulnerability specifically affects PA-5400 Series devices running PAN-OS software with the SSL Forward Proxy feature enabled.
Critical Impact
Successful exploitation of this vulnerability can cause a complete denial of service condition, preventing the firewall from processing any network traffic and potentially leaving networks unprotected or disconnected.
Affected Products
- Palo Alto Networks PAN-OS (multiple versions)
- PA-5410 Firewall
- PA-5420 Firewall
- PA-5430 Firewall
- PA-5440 Firewall
- PA-5445 Firewall
Discovery Timeline
- 2024-04-10 - CVE-2024-3382 published to NVD
- 2025-01-22 - Last updated in NVD database
Technical Details for CVE-2024-3382
Vulnerability Analysis
This vulnerability is classified under CWE-770 (Allocation of Resources Without Limits or Throttling) and CWE-401 (Missing Release of Memory after Effective Lifetime). The memory leak occurs in the SSL Forward Proxy functionality of PAN-OS when processing specially crafted network packets.
When the SSL Forward Proxy feature is enabled on affected PA-5400 Series devices, the system allocates memory to handle incoming encrypted traffic for inspection. The vulnerability causes memory to be allocated but not properly released after processing certain crafted packets, leading to gradual memory exhaustion.
An unauthenticated attacker can exploit this vulnerability remotely over the network without any user interaction. By sending a sustained burst of malicious packets, the attacker can cause memory resources to be depleted until the firewall can no longer process legitimate traffic, resulting in a denial of service condition.
Root Cause
The root cause of this vulnerability is improper memory management in the SSL Forward Proxy feature of PAN-OS. Specifically, the system fails to properly release allocated memory after processing certain types of crafted packets. This missing deallocation (CWE-401) combined with the lack of resource limits on memory allocation (CWE-770) allows an attacker to exhaust available memory resources through repeated exploitation.
Attack Vector
The attack can be initiated remotely over the network by any unauthenticated attacker who can send traffic through the affected firewall. The attacker sends specially crafted packets that are processed by the SSL Forward Proxy feature. Each malicious packet causes a small amount of memory to leak. By sending a high volume of these packets in bursts, the attacker can rapidly deplete available memory resources.
The attack requires:
- Network access to send traffic through the target firewall
- The target device must be a PA-5400 Series firewall (PA-5410, PA-5420, PA-5430, PA-5440, or PA-5445)
- SSL Forward Proxy feature must be enabled on the device
Once memory is exhausted, the firewall becomes unable to process any traffic, effectively causing a denial of service that may persist until the device is restarted or memory is manually cleared.
Detection Methods for CVE-2024-3382
Indicators of Compromise
- Unexpected high memory utilization on PA-5400 Series firewalls that increases over time without corresponding traffic growth
- Firewall performance degradation or unresponsiveness during normal operations
- System logs indicating memory allocation failures or resource exhaustion events
- Traffic processing failures or dropped connections that correlate with memory issues
Detection Strategies
- Monitor memory utilization metrics on PA-5400 Series devices, especially those with SSL Forward Proxy enabled
- Configure alerts for sustained memory growth patterns that do not correlate with legitimate traffic increases
- Implement network traffic analysis to identify unusual bursts of traffic targeting SSL/TLS inspection ports
- Review PAN-OS system logs for memory-related warnings or errors
Monitoring Recommendations
- Establish baseline memory usage patterns for affected devices to identify anomalous consumption
- Enable SNMP or API-based monitoring for real-time memory utilization tracking on PA-5400 Series devices
- Configure threshold-based alerting when memory usage exceeds normal operating parameters
- Implement regular health checks that include memory status verification
How to Mitigate CVE-2024-3382
Immediate Actions Required
- Review your Palo Alto Networks firewall inventory to identify any PA-5400 Series devices (PA-5410, PA-5420, PA-5430, PA-5440, PA-5445)
- Check if SSL Forward Proxy feature is enabled on affected devices
- Apply the latest PAN-OS security patches from Palo Alto Networks immediately
- Monitor affected devices for signs of memory exhaustion until patches can be applied
Patch Information
Palo Alto Networks has released security patches to address this vulnerability. Organizations should consult the Palo Alto Networks Security Advisory for CVE-2024-3382 for specific version information and upgrade paths. The advisory contains detailed information about which PAN-OS versions are affected and the recommended upgrade targets.
Affected versions include PAN-OS 10.2.7 and 10.2.7-h1 on PA-5400 Series hardware. Organizations should upgrade to the fixed versions specified in the vendor advisory.
Workarounds
- If immediate patching is not possible, consider temporarily disabling SSL Forward Proxy on affected PA-5400 Series devices until patches can be applied
- Implement rate limiting on upstream network devices to reduce the volume of traffic that can reach affected firewalls
- Configure automated monitoring and alerting for memory thresholds with automatic restart procedures as a last resort
- Consider deploying redundant firewall configurations to maintain network protection if a device becomes unavailable
# Check current PAN-OS version via CLI
show system info | match sw-version
# Monitor memory utilization on the device
show system resources | match memory
# Review SSL Forward Proxy configuration status
show running security-policy | match ssl
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

