Skip to main content
Mallory

Denial-of-Service Vulnerabilities Disrupting Network Perimeter and Wi‑Fi Infrastructure

actively-exploited-vulnerabilityperimeter-device-exposureoperational-disruptionembedded-device-vulnerabilitywidely-deployed-product-advisory
Updated March 21, 2026 at 02:51 PM2 sources
Share:
Denial-of-Service Vulnerabilities Disrupting Network Perimeter and Wi‑Fi Infrastructure

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

A DoS vulnerability in Palo Alto Networks PAN-OS tracked as CVE-2024-3393 was reported as actively exploited in the wild, allowing unauthenticated remote attackers to send specially crafted DNS packets that can force affected firewalls to reboot and, with repeated triggering, potentially enter maintenance mode, effectively disabling perimeter enforcement. Reported impact is tied to the data plane when DNS Security is enabled and DNS Security logging is active, and it may affect multiple form factors (including PA-Series, VM-Series, CN-Series, and Prisma Access) where the DNS Security license is applied; advisories urge rapid patching/mitigation due to the risk of losing network security controls.

Separately, researchers disclosed a Broadcom chipset software flaw affecting at least the ASUS RT-BE86U that enables an unauthenticated, in-range attacker on 5 GHz Wi‑Fi to send a single malformed frame that immediately disconnects clients, requiring a manual router reset; the issue was found via fuzzing, fixed by Broadcom, and addressed by ASUS in updated firmware (reported fixed in 3.0.0.6.102_37841, affecting 3.0.0.6.102_37612 and older). A Palo Alto Networks advisory on a Chromium monthly vulnerability update lists multiple Chromium CVEs incorporated into Palo Alto products, but it is not directly related to the PAN-OS DNS DoS exploitation or the Broadcom/ASUS Wi‑Fi DoS issue.

Timeline

  1. Jan 15, 2026

    Palo Alto and CISA publish mitigation guidance for CVE-2024-3393

    Palo Alto Networks issued fixed PAN-OS releases and recommended mitigations, including disabling DNS Security logging as a temporary workaround for affected deployments. CISA also warned on the issue and included the vulnerability in its Known Exploited Vulnerabilities catalog.

  2. Jan 15, 2026

    Palo Alto PAN-OS DoS flaw CVE-2024-3393 is exploited in the wild

    A high-severity denial-of-service vulnerability in Palo Alto Networks PAN-OS, tracked as CVE-2024-3393, was reported as being actively exploited against exposed firewalls. The flaw allows unauthenticated attackers to send crafted DNS packets that can crash the data plane, reboot devices, and potentially push them into maintenance mode.

  3. Jan 14, 2026

    Broadcom and ASUS release fixes for affected ASUS router firmware

    Broadcom released a fix for the chipset software flaw and ASUS issued updated firmware to address the issue in affected routers. The vulnerable ASUS RT-BE86U firmware includes version 3.0.0.6.102_37612 and older, with a fix available in version 3.0.0.6.102_37841.

  4. Jan 14, 2026

    Black Duck discovers Broadcom Wi-Fi DoS flaw affecting ASUS routers

    Black Duck disclosed a denial-of-service vulnerability in Broadcom chipset software affecting certain ASUS routers, identified during fuzz testing of the ASUS RT-BE86U. An unauthenticated attacker within 5 GHz Wi-Fi range can send a malformed frame that disconnects all clients and requires a manual router reset to restore connectivity.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Related Stories

Palo Alto PAN-OS Vulnerabilities Including ADNS DoS (CVE-2026-0229)

Palo Alto PAN-OS Vulnerabilities Including ADNS DoS (CVE-2026-0229)

Palo Alto Networks published fixes for multiple **PAN-OS** vulnerabilities affecting supported releases (including PAN-OS 12.1, 11.2, 11.1, and 10.2) and related services such as *Prisma Access* and *Prisma Browser*. The Canadian Centre for Cyber Security amplified the vendor guidance, pointing organizations to apply updates and mitigations for PAN-OS and Prisma products, including **CVE-2026-0228** and **CVE-2026-0229**, and a separate Chromium monthly update advisory referenced by Palo Alto. **CVE-2026-0229** is a network-reachable denial-of-service condition in PAN-OS’s **Advanced DNS Security (ADNS)** feature that can allow an unauthenticated attacker to trigger system reboots with a maliciously crafted packet; repeated triggering can push a firewall into maintenance mode, creating a high availability impact. Exposure requires ADNS to be enabled and a spyware profile action set to `block`, `sinkhole`, or `alert` (i.e., not `allow`); Palo Alto stated *Cloud NGFW* and *Prisma Access* are not impacted by this specific issue and reported no known exploitation. **CVE-2026-0228** involves improper certificate validation that can allow Windows Terminal Server Agents to connect using expired certificates under certain configurations, with no workaround noted by the vendor; affected organizations are advised to upgrade to fixed PAN-OS versions per Palo Alto’s guidance.

1 months ago
Palo Alto Networks PAN-OS and Prisma Browser Vulnerabilities Disclosed

Palo Alto Networks PAN-OS and Prisma Browser Vulnerabilities Disclosed

Palo Alto Networks disclosed a denial-of-service (DoS) vulnerability, identified as CVE-2025-4619, affecting PAN-OS software on PA-Series, VM-Series, CN-Series firewalls, and Prisma Access. This vulnerability allows an unauthenticated attacker to reboot a firewall by sending specially crafted packets through the data plane, potentially causing the device to enter maintenance mode if exploited repeatedly. The company has detailed affected and unaffected PAN-OS versions and confirmed that Cloud NGFW is not impacted. Prisma Access customers have largely been upgraded, with remaining updates scheduled. Additionally, Palo Alto Networks released its November 2025 monthly vulnerability update for Chromium and Prisma Browser, addressing multiple CVEs, including several Chromium vulnerabilities and three specific to Prisma Browser (CVE-2025-4616, CVE-2025-4617, CVE-2025-4618). The Canadian Centre for Cyber Security issued an advisory summarizing these disclosures and urging administrators to review the advisories, apply mitigations, and update affected products to secure their environments against these vulnerabilities.

1 months ago
Palo Alto Networks PAN-OS GlobalProtect DoS Vulnerability (CVE-2026-0227)

Palo Alto Networks PAN-OS GlobalProtect DoS Vulnerability (CVE-2026-0227)

Palo Alto Networks released fixes for **CVE-2026-0227**, a high-severity denial-of-service vulnerability in **PAN-OS** that can be triggered by an **unauthenticated** attacker when the **GlobalProtect gateway or portal** is enabled on affected next-generation firewall and *Prisma Access* configurations. Repeated exploitation attempts can force impacted firewalls into **maintenance mode**, effectively disabling protections and causing service disruption; Palo Alto Networks stated there are **no workarounds** and advised upgrading to patched releases. Reporting indicates a **proof-of-concept (PoC)** exploit exists, although Palo Alto Networks said it had **no evidence of in-the-wild exploitation** at the time of advisory publication. Exposure risk remains material given the large number of internet-facing Palo Alto Networks firewalls observed online (with Shadowserver tracking roughly **6,000** exposed devices) and ongoing scanning activity historically targeting exposed GlobalProtect endpoints; administrators should prioritize patching across affected PAN-OS and Prisma Access versions and validate whether GlobalProtect is enabled on externally reachable interfaces.

1 months ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.