<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Release Date Information in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/release-date-information/m-p/583741#M2981</link>
    <description>&lt;P&gt;Thank you. Unfortunately my account does not have access to this. Would you be able to post the answer original request?&lt;/P&gt;</description>
    <pubDate>Mon, 15 Apr 2024 15:15:16 GMT</pubDate>
    <dc:creator>gundiculous</dc:creator>
    <dc:date>2024-04-15T15:15:16Z</dc:date>
    <item>
      <title>Release Date Information</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/release-date-information/m-p/583738#M2979</link>
      <description>&lt;P&gt;Does anyone have a list of release dates for all software update versions of PAN-OS for 11.1 , 11.0 and 10.2? Thank you.&lt;/P&gt;</description>
      <pubDate>Mon, 15 Apr 2024 14:59:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/release-date-information/m-p/583738#M2979</guid>
      <dc:creator>gundiculous</dc:creator>
      <dc:date>2024-04-15T14:59:12Z</dc:date>
    </item>
    <item>
      <title>Re: Release Date Information</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/release-date-information/m-p/583739#M2980</link>
      <description>&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/customer-resources/support-pan-os-software-release-guidance/ta-p/258304" target="_blank"&gt;https://live.paloaltonetworks.com/t5/customer-resources/support-pan-os-software-release-guidance/ta-p/258304&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;this document (customers only) provides you with details on release dates and install recommendations&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Apr 2024 15:04:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/release-date-information/m-p/583739#M2980</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2024-04-15T15:04:48Z</dc:date>
    </item>
    <item>
      <title>Re: Release Date Information</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/release-date-information/m-p/583741#M2981</link>
      <description>&lt;P&gt;Thank you. Unfortunately my account does not have access to this. Would you be able to post the answer original request?&lt;/P&gt;</description>
      <pubDate>Mon, 15 Apr 2024 15:15:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/release-date-information/m-p/583741#M2981</guid>
      <dc:creator>gundiculous</dc:creator>
      <dc:date>2024-04-15T15:15:16Z</dc:date>
    </item>
    <item>
      <title>Re: Release Date Information</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/release-date-information/m-p/584879#M3054</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/389501597"&gt;@gundiculous&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;below are release dates for PAN-OS 11.1, 11.0 and 10.2.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;TABLE role="grid" width="899px"&gt;
&lt;TBODY aria-live="polite" aria-relevant="all"&gt;
&lt;TR role="row"&gt;
&lt;TD colspan="4" width="898.184px" height="133px"&gt;
&lt;H1 id="toc-hId-1970070558"&gt;&lt;SPAN&gt;&lt;FONT size="4"&gt;&lt;STRONG&gt;11.1&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/H1&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="87.1043px" height="85px"&gt;
&lt;P&gt;&lt;STRONG&gt;New&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="87.1043px" height="85px"&gt;&lt;A href="https://docs.paloaltonetworks.com/ngfw" target="_blank" rel="noopener nofollow noreferrer"&gt;11.1.1-h1&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="97.1236px" height="85px"&gt;04/16/24&lt;/TD&gt;
&lt;TD width="626.852px" height="85px"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;New release, currently monitoring&lt;BR /&gt;&lt;STRONG&gt;Note: Fixed&amp;nbsp;&lt;/STRONG&gt;OS Command Injection Vulnerability in GlobalProtect (reference&amp;nbsp;&lt;A href="https://security.paloaltonetworks.com/CVE-2024-3400" target="_blank" rel="noopener noreferrer nofollow"&gt;CVE-2024-3400&lt;/A&gt;)&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="87.1043px" height="85px"&gt;
&lt;P&gt;&lt;STRONG&gt;New&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="87.1043px" height="85px"&gt;&lt;A href="https://docs.paloaltonetworks.com/ngfw" target="_blank" rel="noopener nofollow noreferrer"&gt;11.1.0-h3&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="97.1236px" height="85px"&gt;04/16/24&lt;/TD&gt;
&lt;TD width="626.852px" height="85px"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;New release, currently monitoring&lt;BR /&gt;&lt;STRONG&gt;Note: Fixed&amp;nbsp;&lt;/STRONG&gt;OS Command Injection Vulnerability in GlobalProtect (reference&amp;nbsp;&lt;A href="https://security.paloaltonetworks.com/CVE-2024-3400" target="_blank" rel="noopener noreferrer nofollow"&gt;CVE-2024-3400&lt;/A&gt;)&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="87.1043px" height="86px"&gt;
&lt;P&gt;&lt;STRONG&gt;P&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="87.1043px" height="86px"&gt;&lt;A href="https://docs.paloaltonetworks.com/ngfw" target="_blank" rel="noopener nofollow noreferrer"&gt;11.1.2-h3&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="97.1236px" height="86px"&gt;04/14/24&lt;/TD&gt;
&lt;TD width="626.852px" height="86px"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;Preferred Release&lt;BR /&gt;&lt;STRONG&gt;Note: Fixed&amp;nbsp;&lt;/STRONG&gt;OS Command Injection Vulnerability in GlobalProtect (reference&amp;nbsp;&lt;A href="https://security.paloaltonetworks.com/CVE-2024-3400" target="_blank" rel="noopener noreferrer nofollow"&gt;CVE-2024-3400&lt;/A&gt;)&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="87.1043px" height="31px"&gt;
&lt;P&gt;&lt;STRONG&gt;New&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="87.1043px" height="31px"&gt;&lt;A href="https://docs.paloaltonetworks.com/ngfw" target="_blank" rel="noopener nofollow noreferrer"&gt;11.1.2-h1&lt;/A&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD width="97.1236px" height="31px"&gt;03/13/24&lt;/TD&gt;
&lt;TD width="626.852px" height="31px"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;New release, currently monitoring&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="87.1043px" height="57px"&gt;
&lt;P&gt;&lt;STRONG&gt;*&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="87.1043px" height="57px"&gt;&lt;A href="https://docs.paloaltonetworks.com/ngfw" target="_blank" rel="noopener nofollow noreferrer"&gt;11.1.2&lt;/A&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD width="97.1236px" height="57px"&gt;02/26/24&lt;/TD&gt;
&lt;TD width="626.852px" height="57px"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;Later release Preferred&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="87.1043px" height="86px"&gt;
&lt;P&gt;&lt;STRONG&gt;New&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="87.1043px" height="86px"&gt;&lt;A href="https://docs.paloaltonetworks.com/ngfw" target="_blank" rel="noopener nofollow noreferrer"&gt;11.1.0-h2&lt;/A&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD width="97.1236px" height="86px"&gt;01/08/24&lt;/TD&gt;
&lt;TD width="626.852px" height="86px"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;New release, currently monitoring&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;Note:&amp;nbsp;&lt;/EM&gt;&lt;/STRONG&gt;PAN-OS Certificate Expirations and New, Comprehensive Certificate Management Process (reference&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/customer-advisories/additional-pan-os-certificate-expirations-and-new-comprehensive/ta-p/572158" target="_blank" rel="noopener"&gt;Customer Advisory&lt;/A&gt;)&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="87.1043px" height="57px"&gt;
&lt;P&gt;&lt;STRONG&gt;*&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="87.1043px" height="57px"&gt;&lt;A href="https://docs.paloaltonetworks.com/ngfw" target="_blank" rel="noopener nofollow noreferrer"&gt;11.1.1&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="97.1236px" height="57px"&gt;12/26/23&lt;/TD&gt;
&lt;TD width="626.852px" height="57px"&gt;&lt;SPAN&gt;Later Release Preferred&lt;BR /&gt;Preferred for Cosmos Platforms (PA-415-5G, PA-5445). Monitoring for other platforms&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="87.1043px" height="86px"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD width="87.1043px" height="86px"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD width="97.1236px" height="86px"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD width="626.852px" height="86px"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;New release, currently monitoring.&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;Note:&amp;nbsp;&lt;/EM&gt;&lt;/STRONG&gt;&lt;EM&gt;Emergency Update Required - PAN-OS Root and Default Certificate Expiration&lt;/EM&gt;&amp;nbsp;(reference&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/customer-advisories/emergency-update-required-pan-os-root-and-default-certificate/ta-p/564672" target="_self"&gt;Customer Advisory&lt;/A&gt;)&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="87.1043px" height="31px"&gt;
&lt;P&gt;&lt;STRONG&gt;New&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="87.1043px" height="31px"&gt;&lt;A href="https://docs.paloaltonetworks.com/ngfw" target="_blank" rel="noopener nofollow noreferrer"&gt;11.1.0&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="97.1236px" height="31px"&gt;11/2/23&lt;/TD&gt;
&lt;TD width="626.852px" height="31px"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;New release, currently monitoring.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD colspan="4" width="898.184px" height="133px"&gt;
&lt;H1 id="toc-hId--582086403"&gt;&lt;SPAN&gt;&lt;FONT size="4"&gt;&lt;STRONG&gt;&lt;BR /&gt;11.0&lt;BR /&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/H1&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="87.1043px" height="85px"&gt;
&lt;P&gt;&lt;STRONG&gt;New&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="87.1043px" height="85px"&gt;&lt;A href="https://docs.paloaltonetworks.com/ngfw" target="_blank" rel="noopener noreferrer nofollow"&gt;11.0.1-h4&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="97.1236px" height="85px"&gt;04/18/24&lt;/TD&gt;
&lt;TD width="626.852px" height="85px"&gt;&lt;SPAN&gt;New release, currently monitoring&lt;BR /&gt;&lt;STRONG&gt;Note: Fixed&amp;nbsp;&lt;/STRONG&gt;OS Command Injection Vulnerability in GlobalProtect (reference&amp;nbsp;&lt;A href="https://security.paloaltonetworks.com/CVE-2024-3400" target="_blank" rel="noopener noreferrer nofollow"&gt;CVE-2024-3400&lt;/A&gt;)&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="87.1043px" height="85px"&gt;
&lt;P&gt;&lt;STRONG&gt;New&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="87.1043px" height="85px"&gt;&lt;A href="https://docs.paloaltonetworks.com/ngfw" target="_blank" rel="noopener noreferrer nofollow"&gt;11.0.0-h3&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="97.1236px" height="85px"&gt;04/18/24&lt;/TD&gt;
&lt;TD width="626.852px" height="85px"&gt;&lt;SPAN&gt;New release, currently monitoring&lt;BR /&gt;&lt;STRONG&gt;Note: Fixed&amp;nbsp;&lt;/STRONG&gt;OS Command Injection Vulnerability in GlobalProtect (reference&amp;nbsp;&lt;A href="https://security.paloaltonetworks.com/CVE-2024-3400" target="_blank" rel="noopener noreferrer nofollow"&gt;CVE-2024-3400&lt;/A&gt;)&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="87.1043px" height="85px"&gt;
&lt;P&gt;&lt;STRONG&gt;New&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="87.1043px" height="85px"&gt;&lt;A href="https://docs.paloaltonetworks.com/ngfw" target="_blank" rel="noopener noreferrer nofollow"&gt;11.0.4-h2&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="97.1236px" height="85px"&gt;04/17/24&lt;/TD&gt;
&lt;TD width="626.852px" height="85px"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;New release, currently monitoring.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;&lt;STRONG&gt;Note: Fixed&amp;nbsp;&lt;/STRONG&gt;OS Command Injection Vulnerability in GlobalProtect (reference&amp;nbsp;&lt;A href="https://security.paloaltonetworks.com/CVE-2024-3400" target="_blank" rel="noopener noreferrer nofollow"&gt;CVE-2024-3400&lt;/A&gt;)&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="87.1043px" height="85px"&gt;
&lt;P&gt;&lt;STRONG&gt;P&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="87.1043px" height="85px"&gt;&lt;A href="https://docs.paloaltonetworks.com/ngfw" target="_blank" rel="noopener noreferrer nofollow"&gt;11.0.3-h10&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="97.1236px" height="85px"&gt;04/16/24&lt;/TD&gt;
&lt;TD width="626.852px" height="85px"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;New release, currently monitoring.&lt;BR /&gt;&lt;STRONG&gt;Note: Fixed&amp;nbsp;&lt;/STRONG&gt;OS Command Injection Vulnerability in GlobalProtect (reference&amp;nbsp;&lt;A href="https://security.paloaltonetworks.com/CVE-2024-3400" target="_blank" rel="noopener noreferrer nofollow"&gt;CVE-2024-3400&lt;/A&gt;)&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="87.1043px" height="86px"&gt;
&lt;P&gt;&lt;STRONG&gt;New&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="87.1043px" height="86px"&gt;&lt;A href="https://docs.paloaltonetworks.com/ngfw" target="_blank" rel="noopener noreferrer nofollow"&gt;11.0.2-h4&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="97.1236px" height="86px"&gt;04/16/24&lt;/TD&gt;
&lt;TD width="626.852px" height="86px"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;New release, currently monitoring.&lt;BR /&gt;&lt;STRONG&gt;Note: Fixed&amp;nbsp;&lt;/STRONG&gt;OS Command Injection Vulnerability in GlobalProtect (reference&amp;nbsp;&lt;A href="https://security.paloaltonetworks.com/CVE-2024-3400" target="_blank" rel="noopener noreferrer nofollow"&gt;CVE-2024-3400&lt;/A&gt;)&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="87.1043px" height="86px"&gt;
&lt;P&gt;&lt;STRONG&gt;New&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="87.1043px" height="86px"&gt;&lt;A href="https://docs.paloaltonetworks.com/ngfw" target="_blank" rel="noopener noreferrer nofollow"&gt;11.0.4-h1&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="97.1236px" height="86px"&gt;4/14/24&lt;/TD&gt;
&lt;TD width="626.852px" height="86px"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;New release, currently monitoring.&lt;BR /&gt;&lt;STRONG&gt;Note: Fixed&amp;nbsp;&lt;/STRONG&gt;OS Command Injection Vulnerability in GlobalProtect (reference&amp;nbsp;&lt;A href="https://security.paloaltonetworks.com/CVE-2024-3400" target="_blank" rel="noopener noreferrer nofollow"&gt;CVE-2024-3400&lt;/A&gt;)&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="87.1043px" height="31px"&gt;
&lt;P&gt;&lt;STRONG&gt;New&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="87.1043px" height="31px"&gt;&lt;A href="https://docs.paloaltonetworks.com/ngfw" target="_blank" rel="noopener noreferrer nofollow"&gt;11.0.4&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="97.1236px" height="31px"&gt;4/08/24&lt;/TD&gt;
&lt;TD width="626.852px" height="31px"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;New release, currently monitoring&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="87.1043px" height="57px"&gt;
&lt;P&gt;&lt;STRONG&gt;*&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="87.1043px" height="57px"&gt;&lt;A href="https://docs.paloaltonetworks.com/ngfw" target="_blank" rel="noopener noreferrer nofollow"&gt;11.0.3-h5&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="97.1236px" height="57px"&gt;02/22/24&lt;/TD&gt;
&lt;TD width="626.852px" height="57px"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;Later release preferred (affected by&amp;nbsp;OS Command Injection Vulnerability in GlobalProtect (reference&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://security.paloaltonetworks.com/CVE-2024-3400" target="_blank" rel="noopener noreferrer nofollow"&gt;CVE-2024-3400&lt;/A&gt;&lt;SPAN&gt;))&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="87.1043px" height="528px"&gt;
&lt;P&gt;&lt;STRONG&gt;*&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="87.1043px" height="528px"&gt;&lt;A href="https://docs.paloaltonetworks.com/ngfw" target="_blank" rel="noopener nofollow noreferrer"&gt;11.0.3-h3&lt;/A&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD width="97.1236px" height="528px"&gt;01/16/24&lt;/TD&gt;
&lt;TD width="626.852px" height="528px"&gt;
&lt;P data-unlink="true"&gt;Later release preferred&lt;/P&gt;
&lt;P data-unlink="true"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;STRONG&gt;Note&lt;/STRONG&gt;:&amp;nbsp;GlobalProtect tunnel might disconnect shortly after being established when SSL is used as a transport protocol. Workaround: Disable Internet Protocol Version 6 (TCP/IPv6) on the PANGP Virtual Network Adapter.&lt;/P&gt;
&lt;P data-unlink="true"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;STRONG&gt;Note&lt;/STRONG&gt;:&amp;nbsp;The GlobalProtect app cannot connect to a portal or gateway and GlobalProtect Clientless VPN users cannot access applications if authentication takes longer than 20 seconds. Workaround: Increase the TCP handshake timeout to the maximum value of 60 seconds (reference PAN-227368).&lt;/P&gt;
&lt;P data-unlink="true"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;STRONG&gt;Note:&lt;/STRONG&gt;&amp;nbsp;Scheduled Antivirus updates failed when external dynamic lists were configured on the firewall. (reference PAN-220659).&lt;/P&gt;
&lt;P data-unlink="true"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;STRONG&gt;Note:&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;Tabs in the ACC such as Network Activity, Threat Activity, and Blocked Activity do not display data when you applied a Time filter of Last 15 Minutes, Last Hour, Last 6 Hours, or Last 12 Hours, and the data that was displayed with the Last 24 Hours filter was not accurate. Reports that were run against summary logs also did not display accurate results (reference PAN-234929).&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="87.1043px" height="86px"&gt;
&lt;P&gt;&lt;STRONG&gt;New&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="87.1043px" height="86px"&gt;&lt;A href="https://docs.paloaltonetworks.com/ngfw" target="_blank" rel="noopener nofollow noreferrer"&gt;11.0.2-h3&lt;/A&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD width="97.1236px" height="86px"&gt;01/10/24&lt;/TD&gt;
&lt;TD width="626.852px" height="86px"&gt;
&lt;P data-unlink="true"&gt;New release, currently monitoring&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;EM&gt;Note:&amp;nbsp;&lt;/EM&gt;PAN-OS Certificate Expirations and New, Comprehensive Certificate Management Process (reference&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/customer-advisories/additional-pan-os-certificate-expirations-and-new-comprehensive/ta-p/572158" target="_blank" rel="noopener"&gt;Customer Advisory&lt;/A&gt;)&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="87.1043px" height="86px"&gt;
&lt;P&gt;&lt;STRONG&gt;New&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="87.1043px" height="86px"&gt;&lt;A href="https://docs.paloaltonetworks.com/ngfw" target="_blank" rel="noopener nofollow noreferrer"&gt;11.0.1-h3&lt;/A&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD width="97.1236px" height="86px"&gt;01/08/24&lt;/TD&gt;
&lt;TD width="626.852px" height="86px"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;New release, currently monitoring&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;Note:&amp;nbsp;&lt;/EM&gt;&lt;/STRONG&gt;PAN-OS Certificate Expirations and New, Comprehensive Certificate Management Process (reference&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/customer-advisories/additional-pan-os-certificate-expirations-and-new-comprehensive/ta-p/572158" target="_blank" rel="noopener"&gt;Customer Advisory&lt;/A&gt;)&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="87.1043px" height="86px"&gt;
&lt;P&gt;&lt;STRONG&gt;New&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="87.1043px" height="86px"&gt;&lt;A href="https://docs.paloaltonetworks.com/ngfw" target="_blank" rel="noopener nofollow noreferrer"&gt;11.0.0-h2&lt;/A&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD width="97.1236px" height="86px"&gt;01/08/24&lt;/TD&gt;
&lt;TD width="626.852px" height="86px"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;New release, currently monitoring&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;Note:&amp;nbsp;&lt;/EM&gt;&lt;/STRONG&gt;PAN-OS Certificate Expirations and New, Comprehensive Certificate Management Process (reference&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/customer-advisories/additional-pan-os-certificate-expirations-and-new-comprehensive/ta-p/572158" target="_blank" rel="noopener"&gt;Customer Advisory&lt;/A&gt;)&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="87.1043px" height="86px"&gt;
&lt;P&gt;&lt;STRONG&gt;New&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="87.1043px" height="86px"&gt;&lt;A href="https://docs.paloaltonetworks.com/ngfw" target="_self" rel="nofollow noopener noreferrer"&gt;11.0.0-h1&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="97.1236px" height="86px"&gt;11/7/23&lt;/TD&gt;
&lt;TD width="626.852px" height="86px"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;New release, currently monitoring.&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;Note:&amp;nbsp;&lt;/EM&gt;&lt;/STRONG&gt;&lt;EM&gt;Emergency Update Required - PAN-OS Root and Default Certificate Expiration&lt;/EM&gt;&amp;nbsp;(reference&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/customer-advisories/emergency-update-required-pan-os-root-and-default-certificate/ta-p/564672" target="_self"&gt;Customer Advisory&lt;/A&gt;)&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="87.1043px" height="31px"&gt;
&lt;P&gt;&lt;STRONG&gt;New&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="87.1043px" height="31px"&gt;&lt;A href="https://docs.paloaltonetworks.com/ngfw" target="_blank" rel="noopener nofollow noreferrer"&gt;11.0.3&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="97.1236px" height="31px"&gt;11/7/23&lt;/TD&gt;
&lt;TD width="626.852px" height="31px"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;Note: A memory leak in the logrcvr process may cause the firewall to be unstable.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="87.1043px" height="86px"&gt;
&lt;P&gt;&lt;STRONG&gt;*&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="87.1043px" height="86px"&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-release-notes" target="_blank" rel="noopener nofollow noreferrer"&gt;11.0.2-h2&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="97.1236px" height="86px"&gt;9/21/23&lt;/TD&gt;
&lt;TD width="626.852px" height="86px"&gt;
&lt;P data-unlink="true"&gt;Later release preferred.&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;EM&gt;Note:&amp;nbsp;&lt;/EM&gt;Denial-of-Service (DoS) Vulnerability in BGP Software (reference&amp;nbsp;&lt;A href="https://security.paloaltonetworks.com/CVE-2023-38802" target="_blank" rel="noopener noreferrer nofollow"&gt;CVE-2023-38802&lt;/A&gt;)&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="87.1043px" height="86px"&gt;
&lt;P&gt;&lt;STRONG&gt;*&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="87.1043px" height="86px"&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-release-notes" target="_blank" rel="noopener nofollow noreferrer"&gt;11.0.2-h1&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="97.1236px" height="86px"&gt;8/17/23&lt;/TD&gt;
&lt;TD width="626.852px" height="86px"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;Multiple issues addressed in 11.0.2-h2. (reference&amp;nbsp;&lt;A href="https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-release-notes/pan-os-11-0-2-known-and-addressed-issues/pan-os-11-0-2-h2-addressed-issues" target="_blank" rel="noopener noreferrer nofollow"&gt;11.0.2-h2 addressed issues&lt;/A&gt;)&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;Note:&amp;nbsp;&lt;/EM&gt;&lt;/STRONG&gt;Denial-of-Service (DoS) Vulnerability in BGP Software (reference&amp;nbsp;&lt;A href="https://security.paloaltonetworks.com/CVE-2023-38802" target="_blank" rel="noopener noreferrer nofollow"&gt;CVE-2023-38802&lt;/A&gt;)&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="87.1043px" height="112px"&gt;
&lt;P&gt;&lt;STRONG&gt;*&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="87.1043px" height="112px"&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-release-notes" target="_blank" rel="noopener nofollow noreferrer"&gt;11.0.2&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="97.1236px" height="112px"&gt;6/29/23&lt;/TD&gt;
&lt;TD width="626.852px" height="112px"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;Multiple issues addressed in 11.0.2-h2. (reference&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-release-notes/pan-os-11-0-2-known-and-addressed-issues/pan-os-11-0-2-h2-addressed-issues" target="_blank" rel="noopener noreferrer nofollow"&gt;11.0.2-h2 addressed issues&lt;/A&gt;&lt;SPAN&gt;)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;&lt;STRONG&gt;&lt;EM&gt;Note:&amp;nbsp;&lt;/EM&gt;&lt;/STRONG&gt;Denial-of-Service (DoS) Vulnerability in BGP Software (reference&amp;nbsp;&lt;A href="https://security.paloaltonetworks.com/CVE-2023-38802" target="_blank" rel="noopener noreferrer nofollow"&gt;CVE-2023-38802&lt;/A&gt;)&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="87.1043px" height="86px"&gt;
&lt;P&gt;&lt;STRONG&gt;*&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="87.1043px" height="86px"&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-release-notes" target="_blank" rel="noopener nofollow noreferrer"&gt;11.0.1-h2&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="97.1236px" height="86px"&gt;5/31/23&lt;/TD&gt;
&lt;TD width="626.852px" height="86px"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;Multiple issues addressed in 11.0.2. (reference&amp;nbsp;&lt;A href="https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-release-notes/pan-os-11-0-2-known-and-addressed-issues/pan-os-11-0-2-addressed-issues" target="_blank" rel="noopener noreferrer nofollow"&gt;11.0.2 addressed issues&lt;/A&gt;)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;&lt;STRONG&gt;&lt;EM&gt;Note:&amp;nbsp;&lt;/EM&gt;&lt;/STRONG&gt;Denial-of-Service (DoS) Vulnerability in BGP Software (reference&amp;nbsp;&lt;A href="https://security.paloaltonetworks.com/CVE-2023-38802" target="_blank" rel="noopener noreferrer nofollow"&gt;CVE-2023-38802&lt;/A&gt;)&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="87.1043px" height="86px"&gt;
&lt;P&gt;&lt;STRONG&gt;*&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="87.1043px" height="86px"&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-release-notes" target="_blank" rel="noopener nofollow noreferrer"&gt;11.0.1&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="97.1236px" height="86px"&gt;3/30/23&lt;/TD&gt;
&lt;TD width="626.852px" height="86px"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;Multiple issues addressed in 11.0.1-h2. (reference&amp;nbsp;&lt;A href="https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-release-notes/pan-os-11-0-1-known-and-addressed-issues/pan-os-11-0-1-h2-addressed-issues" target="_blank" rel="noopener noreferrer nofollow"&gt;11.0.1-h2 addressed issues&lt;/A&gt;)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;&lt;STRONG&gt;&lt;EM&gt;Note:&amp;nbsp;&lt;/EM&gt;&lt;/STRONG&gt;Denial-of-Service (DoS) Vulnerability in BGP Software (reference&amp;nbsp;&lt;A href="https://security.paloaltonetworks.com/CVE-2023-38802" target="_blank" rel="noopener noreferrer nofollow"&gt;CVE-2023-38802&lt;/A&gt;)&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD colspan="4" width="898.184px" height="106px"&gt;
&lt;H1 id="toc-hId-1160723932" class="lia-align-left"&gt;&lt;SPAN&gt;&lt;FONT size="4"&gt;&lt;STRONG&gt;&lt;BR /&gt;10.2&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/H1&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="87.1043px" height="85px"&gt;
&lt;P&gt;&lt;STRONG&gt;New&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="87.1043px" height="85px"&gt;&lt;A href="https://docs.paloaltonetworks.com/ngfw" target="_blank" rel="noopener noreferrer nofollow"&gt;10.2.1-h2&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="97.1236px" height="85px"&gt;04/18/24&lt;/TD&gt;
&lt;TD width="626.852px" height="85px"&gt;&lt;SPAN&gt;New release, currently monitoring&lt;BR /&gt;&lt;STRONG&gt;Note: Fixed&amp;nbsp;&lt;/STRONG&gt;OS Command Injection Vulnerability in GlobalProtect (reference&amp;nbsp;&lt;A href="https://security.paloaltonetworks.com/CVE-2024-3400" target="_blank" rel="noopener noreferrer nofollow"&gt;CVE-2024-3400&lt;/A&gt;)&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="87.1043px" height="85px"&gt;
&lt;P&gt;&lt;STRONG&gt;New&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="87.1043px" height="85px"&gt;&lt;A href="https://docs.paloaltonetworks.com/ngfw" target="_blank" rel="noopener noreferrer nofollow"&gt;10.2.0-h3&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="97.1236px" height="85px"&gt;04/18/24&lt;/TD&gt;
&lt;TD width="626.852px" height="85px"&gt;&lt;SPAN&gt;New release, currently monitoring&lt;BR /&gt;&lt;STRONG&gt;Note: Fixed&amp;nbsp;&lt;/STRONG&gt;OS Command Injection Vulnerability in GlobalProtect (reference&amp;nbsp;&lt;A href="https://security.paloaltonetworks.com/CVE-2024-3400" target="_blank" rel="noopener noreferrer nofollow"&gt;CVE-2024-3400&lt;/A&gt;)&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="87.1043px" height="85px"&gt;
&lt;P&gt;&lt;STRONG&gt;New&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="87.1043px" height="85px"&gt;&lt;A href="https://docs.paloaltonetworks.com/ngfw" target="_blank" rel="noopener noreferrer nofollow"&gt;10.2.4-h16&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="97.1236px" height="85px"&gt;04/18/24&lt;/TD&gt;
&lt;TD width="626.852px" height="85px"&gt;&lt;SPAN&gt;New release, currently monitoring&lt;BR /&gt;&lt;STRONG&gt;Note: Fixed&amp;nbsp;&lt;/STRONG&gt;OS Command Injection Vulnerability in GlobalProtect (reference&amp;nbsp;&lt;A href="https://security.paloaltonetworks.com/CVE-2024-3400" target="_blank" rel="noopener noreferrer nofollow"&gt;CVE-2024-3400&lt;/A&gt;)&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="87.1043px" height="85px"&gt;
&lt;P&gt;&lt;STRONG&gt;New&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="87.1043px" height="85px"&gt;&lt;A href="https://docs.paloaltonetworks.com/ngfw" target="_blank" rel="noopener noreferrer nofollow"&gt;10.2.3-h13&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="97.1236px" height="85px"&gt;04/18/24&lt;/TD&gt;
&lt;TD width="626.852px" height="85px"&gt;&lt;SPAN&gt;New release, currently monitoring&lt;BR /&gt;&lt;STRONG&gt;Note: Fixed&amp;nbsp;&lt;/STRONG&gt;OS Command Injection Vulnerability in GlobalProtect (reference&amp;nbsp;&lt;A href="https://security.paloaltonetworks.com/CVE-2024-3400" target="_blank" rel="noopener noreferrer nofollow"&gt;CVE-2024-3400&lt;/A&gt;)&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="87.1043px" height="85px"&gt;
&lt;P&gt;&lt;STRONG&gt;New&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="87.1043px" height="85px"&gt;&lt;A href="https://docs.paloaltonetworks.com/ngfw" target="_blank" rel="noopener noreferrer nofollow"&gt;10.2.2-h5&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="97.1236px" height="85px"&gt;04/18/24&lt;/TD&gt;
&lt;TD width="626.852px" height="85px"&gt;&lt;SPAN&gt;New release, currently monitoring&lt;BR /&gt;&lt;STRONG&gt;Note: Fixed&amp;nbsp;&lt;/STRONG&gt;OS Command Injection Vulnerability in GlobalProtect (reference&amp;nbsp;&lt;A href="https://security.paloaltonetworks.com/CVE-2024-3400" target="_blank" rel="noopener noreferrer nofollow"&gt;CVE-2024-3400&lt;/A&gt;)&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="87.1043px" height="85px"&gt;
&lt;P&gt;&lt;STRONG&gt;New&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="87.1043px" height="85px"&gt;&lt;A href="https://docs.paloaltonetworks.com/ngfw" target="_blank" rel="noopener noreferrer nofollow"&gt;10.2.5-h6&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="97.1236px" height="85px"&gt;04/16/24&lt;/TD&gt;
&lt;TD width="626.852px" height="85px"&gt;&lt;SPAN&gt;New release, currently monitoring&lt;BR /&gt;&lt;STRONG&gt;Note: Fixed&amp;nbsp;&lt;/STRONG&gt;OS Command Injection Vulnerability in GlobalProtect (reference&amp;nbsp;&lt;A href="https://security.paloaltonetworks.com/CVE-2024-3400" target="_blank" rel="noopener noreferrer nofollow"&gt;CVE-2024-3400&lt;/A&gt;)&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="87.1043px" height="85px"&gt;
&lt;P&gt;&lt;STRONG&gt;New&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="87.1043px" height="85px"&gt;&lt;A href="https://docs.paloaltonetworks.com/ngfw" target="_blank" rel="noopener noreferrer nofollow"&gt;10.2.6-h3&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="97.1236px" height="85px"&gt;04/15/24&lt;/TD&gt;
&lt;TD width="626.852px" height="85px"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;New release, currently monitoring&lt;BR /&gt;&lt;STRONG&gt;Note: Fixed&amp;nbsp;&lt;/STRONG&gt;OS Command Injection Vulnerability in GlobalProtect (reference&amp;nbsp;&lt;A href="https://security.paloaltonetworks.com/CVE-2024-3400" target="_blank" rel="noopener noreferrer nofollow"&gt;CVE-2024-3400&lt;/A&gt;)&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="87.1043px" height="86px"&gt;
&lt;P&gt;&lt;STRONG&gt;P&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="87.1043px" height="86px"&gt;&lt;A href="https://docs.paloaltonetworks.com/ngfw" target="_blank" rel="noopener nofollow noreferrer"&gt;10.2.8-h3&lt;/A&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD width="97.1236px" height="86px"&gt;04/15/24&lt;/TD&gt;
&lt;TD width="626.852px" height="86px"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;Preferred release&lt;BR /&gt;&lt;STRONG&gt;Note: Fixed&amp;nbsp;&lt;/STRONG&gt;OS Command Injection Vulnerability in GlobalProtect (reference&amp;nbsp;&lt;A href="https://security.paloaltonetworks.com/CVE-2024-3400" target="_blank" rel="noopener noreferrer nofollow"&gt;CVE-2024-3400&lt;/A&gt;)&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="87.1043px" height="86px"&gt;
&lt;P&gt;&lt;STRONG&gt;New&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="87.1043px" height="86px"&gt;&lt;A href="https://docs.paloaltonetworks.com/ngfw" target="_blank" rel="noopener nofollow noreferrer"&gt;10.2.7-h8&lt;/A&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD width="97.1236px" height="86px"&gt;04/15/24&lt;/TD&gt;
&lt;TD width="626.852px" height="86px"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;New release, currently monitoring&lt;BR /&gt;&lt;STRONG&gt;Note: Fixed&amp;nbsp;&lt;/STRONG&gt;OS Command Injection Vulnerability in GlobalProtect (reference&amp;nbsp;&lt;A href="https://security.paloaltonetworks.com/CVE-2024-3400" target="_blank" rel="noopener noreferrer nofollow"&gt;CVE-2024-3400&lt;/A&gt;)&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="87.1043px" height="86px"&gt;
&lt;P&gt;&lt;STRONG&gt;New&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="87.1043px" height="86px"&gt;&lt;A href="https://docs.paloaltonetworks.com/ngfw" target="_blank" rel="noopener nofollow noreferrer"&gt;10.2.9-h1&lt;/A&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD width="97.1236px" height="86px"&gt;04/14/24&lt;/TD&gt;
&lt;TD width="626.852px" height="86px"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;New release, currently monitoring.&lt;/SPAN&gt;&lt;BR /&gt;&lt;STRONG&gt;Note: Fixed&amp;nbsp;&lt;/STRONG&gt;&lt;SPAN&gt;OS Command Injection Vulnerability in GlobalProtect (reference&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://security.paloaltonetworks.com/CVE-2024-3400" target="_blank" rel="noopener noreferrer nofollow"&gt;CVE-2024-3400&lt;/A&gt;&lt;SPAN&gt;)&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="87.1043px" height="31px"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD width="87.1043px" height="31px"&gt;&lt;A href="https://docs.paloaltonetworks.com/ngfw" target="_blank" rel="noopener nofollow noreferrer"&gt;10.2.9&lt;/A&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD width="97.1236px" height="31px"&gt;04/01/24&lt;/TD&gt;
&lt;TD width="626.852px" height="31px"&gt;
&lt;P data-unlink="true"&gt;New release&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="87.1043px" height="31px"&gt;
&lt;P&gt;&lt;STRONG&gt;*&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="87.1043px" height="31px"&gt;&lt;A href="https://docs.paloaltonetworks.com/ngfw" target="_blank" rel="noopener nofollow noreferrer"&gt;10.2.8&lt;/A&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD width="97.1236px" height="31px"&gt;02/12/24&lt;/TD&gt;
&lt;TD width="626.852px" height="31px"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;Later release preferred&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="87.1043px" height="31px"&gt;
&lt;P&gt;&lt;STRONG&gt;*&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="87.1043px" height="31px"&gt;&lt;A href="https://docs.paloaltonetworks.com/ngfw" target="_blank" rel="noopener nofollow noreferrer"&gt;10.2.7-h6&lt;/A&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD width="97.1236px" height="31px"&gt;03/04/24&lt;/TD&gt;
&lt;TD width="626.852px" height="31px"&gt;
&lt;P data-unlink="true"&gt;Later release preferred&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="87.1043px" height="86px"&gt;
&lt;P&gt;&lt;STRONG&gt;*&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="87.1043px" height="86px"&gt;&lt;A href="https://docs.paloaltonetworks.com/ngfw" target="_blank" rel="noopener nofollow noreferrer"&gt;10.2.6-h1&lt;/A&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD width="97.1236px" height="86px"&gt;01/08/24&lt;/TD&gt;
&lt;TD width="626.852px" height="86px"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;&lt;STRONG&gt;&lt;EM&gt;Note:&amp;nbsp;&lt;/EM&gt;&lt;/STRONG&gt;PAN-OS Certificate Expirations and New, Comprehensive Certificate Management Process (reference&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/customer-advisories/additional-pan-os-certificate-expirations-and-new-comprehensive/ta-p/572158" target="_blank" rel="noopener"&gt;Customer Advisory&lt;/A&gt;)&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="87.1043px" height="86px"&gt;
&lt;P&gt;&lt;STRONG&gt;*&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="87.1043px" height="86px"&gt;&lt;A href="https://docs.paloaltonetworks.com/ngfw" target="_blank" rel="noopener nofollow noreferrer"&gt;10.2.4-h10&lt;/A&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD width="97.1236px" height="86px"&gt;01/08/24&lt;/TD&gt;
&lt;TD width="626.852px" height="86px"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;&lt;STRONG&gt;&lt;EM&gt;Note:&amp;nbsp;&lt;/EM&gt;&lt;/STRONG&gt;PAN-OS Certificate Expirations and New, Comprehensive Certificate Management Process (reference&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/customer-advisories/additional-pan-os-certificate-expirations-and-new-comprehensive/ta-p/572158" target="_blank" rel="noopener"&gt;Customer Advisory&lt;/A&gt;)&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="87.1043px" height="58px"&gt;
&lt;P&gt;&lt;STRONG&gt;*&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="87.1043px" height="58px"&gt;&lt;A href="https://docs.paloaltonetworks.com/ngfw" target="_blank" rel="noopener nofollow noreferrer"&gt;10.2.3-h12&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="97.1236px" height="58px"&gt;02/28/24&lt;/TD&gt;
&lt;TD width="626.852px" height="58px"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;&lt;STRONG&gt;&lt;EM&gt;Note:&amp;nbsp;&lt;/EM&gt;&lt;/STRONG&gt;PAN-OS Certificate Expirations and New, Comprehensive Certificate Management Process (reference&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/customer-advisories/additional-pan-os-certificate-expirations-and-new-comprehensive/ta-p/572158" target="_blank" rel="noopener"&gt;Customer Advisory&lt;/A&gt;)&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="87.1043px" height="251px"&gt;
&lt;P&gt;&lt;STRONG&gt;*&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="87.1043px" height="251px"&gt;&lt;A href="https://docs.paloaltonetworks.com/ngfw" target="_blank" rel="noopener nofollow noreferrer"&gt;10.2.3-h11&lt;/A&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD width="97.1236px" height="251px"&gt;01/08/24&lt;/TD&gt;
&lt;TD width="626.852px" height="251px"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;&lt;STRONG&gt;&lt;EM&gt;Note:&amp;nbsp;&lt;/EM&gt;&lt;/STRONG&gt;PAN-OS Certificate Expirations and New, Comprehensive Certificate Management Process (reference&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/customer-advisories/additional-pan-os-certificate-expirations-and-new-comprehensive/ta-p/572158" target="_blank" rel="noopener"&gt;Customer Advisory&lt;/A&gt;)&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;&lt;EM&gt;&lt;STRONG&gt;Note:&lt;/STRONG&gt;&lt;/EM&gt;&amp;nbsp;Traffic through a PA-3400 series device may stop completely after upgrading/downgrading from PAN-OS 10.2.3-h9/10.2.3-h11 to any PAN-OS version, including reinstalling the same version. If a firewall has not been upgraded to PAN-OS 10.2.3-h9/10.2.3-h11, do not upgrade to any of these two versions, but install directly PAN-OS 10.2.3-h12. If a firewall has already been upgraded to PAN-OS 10.2.3-h9/10.2.3-h11, then perform a reboot before upgrading to any release (reference&amp;nbsp;&lt;A title="Traffic outage on a PA-3400 device after an upgrade/downgrade from 10.2.3-h9/10.2.3-h11" href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008XM5CAM" target="_blank" rel="noopener nofollow noreferrer"&gt;Knowledge Base Article&lt;/A&gt;).&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="87.1043px" height="86px"&gt;
&lt;P&gt;&lt;STRONG&gt;*&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="87.1043px" height="86px"&gt;&lt;A href="https://docs.paloaltonetworks.com/ngfw" target="_blank" rel="noopener nofollow noreferrer"&gt;10.2.2-h4&lt;/A&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD width="97.1236px" height="86px"&gt;01/08/24&lt;/TD&gt;
&lt;TD width="626.852px" height="86px"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;&lt;STRONG&gt;&lt;EM&gt;Note:&amp;nbsp;&lt;/EM&gt;&lt;/STRONG&gt;PAN-OS Certificate Expirations and New, Comprehensive Certificate Management Process (reference&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/customer-advisories/additional-pan-os-certificate-expirations-and-new-comprehensive/ta-p/572158" target="_blank" rel="noopener"&gt;Customer Advisory&lt;/A&gt;)&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="87.1043px" height="86px"&gt;
&lt;P&gt;&lt;STRONG&gt;*&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="87.1043px" height="86px"&gt;&lt;A href="https://docs.paloaltonetworks.com/ngfw" target="_blank" rel="noopener nofollow noreferrer"&gt;10.2.1-h1&lt;/A&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD width="97.1236px" height="86px"&gt;01/08/24&lt;/TD&gt;
&lt;TD width="626.852px" height="86px"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;&lt;STRONG&gt;&lt;EM&gt;Note:&amp;nbsp;&lt;/EM&gt;&lt;/STRONG&gt;PAN-OS Certificate Expirations and New, Comprehensive Certificate Management Process (reference&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/customer-advisories/additional-pan-os-certificate-expirations-and-new-comprehensive/ta-p/572158" target="_blank" rel="noopener"&gt;Customer Advisory&lt;/A&gt;)&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="87.1043px" height="86px"&gt;
&lt;P&gt;&lt;STRONG&gt;*&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="87.1043px" height="86px"&gt;&lt;A href="https://docs.paloaltonetworks.com/ngfw" target="_blank" rel="noopener nofollow noreferrer"&gt;10.2.0-h2&lt;/A&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD width="97.1236px" height="86px"&gt;01/08/24&lt;/TD&gt;
&lt;TD width="626.852px" height="86px"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;&lt;STRONG&gt;&lt;EM&gt;Note:&amp;nbsp;&lt;/EM&gt;&lt;/STRONG&gt;PAN-OS Certificate Expirations and New, Comprehensive Certificate Management Process (reference&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/customer-advisories/additional-pan-os-certificate-expirations-and-new-comprehensive/ta-p/572158" target="_blank" rel="noopener"&gt;Customer Advisory&lt;/A&gt;)&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="87.1043px" height="142px"&gt;
&lt;P&gt;&lt;STRONG&gt;*&lt;/STRONG&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="87.1043px" height="142px"&gt;&lt;A href="https://docs.paloaltonetworks.com/ngfw" target="_self" rel="nofollow noopener noreferrer"&gt;10.2.7-h3&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="97.1236px" height="142px"&gt;12/18/23&lt;/TD&gt;
&lt;TD width="626.852px" height="142px"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;Later release preferred.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;&lt;EM&gt;&lt;STRONG&gt;Note:&lt;/STRONG&gt;&lt;/EM&gt;&amp;nbsp;Addresses PAN-234929 (reference&amp;nbsp;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-release-notes/pan-os-10-2-7-known-and-addressed-issues/pan-os-10-2-7-h3-addressed-issues" target="_blank" rel="noopener nofollow noreferrer"&gt;10.2.7-h3 Addressed Issues&lt;/A&gt;)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;&lt;EM&gt;&lt;STRONG&gt;Note:&lt;/STRONG&gt;&lt;/EM&gt;&amp;nbsp;GlobalProtect tunnel might disconnect shortly after being established when SSL is used as a transport protocol. Workaround: Disable Internet Protocol Version 6 (TCP/IPv6) on the PANGP Virtual Network Adapter.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="87.1043px" height="86px"&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="87.1043px" height="86px"&gt;&lt;A href="https://docs.paloaltonetworks.com/ngfw" target="_self" rel="nofollow noopener noreferrer"&gt;10.2.7-h1&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="97.1236px" height="86px"&gt;11/22/23&lt;/TD&gt;
&lt;TD width="626.852px" height="86px"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;Later release preferred.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;&lt;STRONG&gt;&lt;EM&gt;Note:&amp;nbsp;&lt;/EM&gt;&lt;/STRONG&gt;&lt;EM&gt;Emergency Update Required - PAN-OS Root and Default Certificate Expiration&lt;/EM&gt;&amp;nbsp;(reference&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/customer-advisories/emergency-update-required-pan-os-root-and-default-certificate/ta-p/564672" target="_self"&gt;Customer Advisory&lt;/A&gt;)&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="87.1043px" height="195px"&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="87.1043px" height="195px"&gt;&lt;A href="https://docs.paloaltonetworks.com/ngfw" target="_self" rel="nofollow noopener noreferrer"&gt;10.2.7&lt;/A&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD width="97.1236px" height="195px"&gt;11/9/23&lt;/TD&gt;
&lt;TD width="626.852px" height="195px"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;Later release preferred.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;&lt;EM&gt;&lt;STRONG&gt;Note:&lt;/STRONG&gt;&lt;/EM&gt;&amp;nbsp;The tabs in the ACC, such as Network Activity, Threat Activity, Blocked Activity etc. might be blank when you apply a Time filter for the Last 15 Minutes, Last Hour, Last 6 Hours, or Last 12 Hours. With a Last 24 Hours Time filter, the data displayed might not be accurate. Additionally, reports run against summary logs might not display accurate results (reference PAN-234929 in&amp;nbsp;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-release-notes/pan-os-10-2-7-known-and-addressed-issues/pan-os-10-2-7-known-issues" target="_blank" rel="noopener nofollow noreferrer"&gt;10.2.7 known issues&lt;/A&gt;).&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="87.1043px" height="279px"&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="87.1043px" height="279px"&gt;&lt;A href="https://docs.paloaltonetworks.com/ngfw" target="_self" rel="nofollow noopener noreferrer"&gt;10.2.3-h9&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="97.1236px" height="279px"&gt;11/7/23&lt;/TD&gt;
&lt;TD width="626.852px" height="279px"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;Later release preferred.&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;Note:&amp;nbsp;&lt;/EM&gt;&lt;/STRONG&gt;&lt;EM&gt;Emergency Update Required - PAN-OS Root and Default Certificate Expiration&lt;/EM&gt;&amp;nbsp;(reference&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/customer-advisories/emergency-update-required-pan-os-root-and-default-certificate/ta-p/564672" target="_self"&gt;Customer Advisory&lt;/A&gt;)&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;&lt;EM&gt;&lt;STRONG&gt;Note:&lt;/STRONG&gt;&lt;/EM&gt;&amp;nbsp;Traffic through a PA-3400 series device may stop completely after upgrading/downgrading from PAN-OS 10.2.3-h9/10.2.3-h11 to any PAN-OS version, including reinstalling the same version. If a firewall has not been upgraded to PAN-OS 10.2.3-h9/10.2.3-h11, do not upgrade to any of these two versions, but install directly PAN-OS 10.2.3-h12. If a firewall has already been upgraded to PAN-OS 10.2.3-h9/10.2.3-h11, then perform a reboot before upgrading to any release (reference&amp;nbsp;&lt;A title="Traffic outage on a PA-3400 device after an upgrade/downgrade from 10.2.3-h9/10.2.3-h11" href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008XM5CAM" target="_blank" rel="noopener nofollow noreferrer"&gt;Knowledge Base Article&lt;/A&gt;).&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="87.1043px" height="196px"&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="87.1043px" height="196px"&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-release-notes" target="_blank" rel="noopener nofollow noreferrer"&gt;10.2.6&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="97.1236px" height="196px"&gt;9/27/23&lt;/TD&gt;
&lt;TD width="626.852px" height="196px"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;Later release preferred.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;&lt;EM&gt;&lt;STRONG&gt;Note:&lt;/STRONG&gt;&lt;/EM&gt;&amp;nbsp;The tabs in the ACC, such as Network Activity, Threat Activity, Blocked Activity etc might be blank when you apply a Time filter for the Last 15 Minutes, Last Hour, Last 6 Hours, or Last 12 Hours. With a Last 24 Hours Time filter, the data displayed might not be accurate. Additionally, reports run against summary logs might not display accurate results (reference PAN-234929 in&amp;nbsp;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-release-notes/pan-os-10-2-6-known-and-addressed-issues/pan-os-10-2-6-known-issues" target="_blank" rel="noopener nofollow noreferrer"&gt;10.2.6 known issues&lt;/A&gt;).&amp;nbsp;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;Note:&lt;/STRONG&gt;&lt;/EM&gt;&amp;nbsp;Addresses BGP vulnerability&amp;nbsp;&lt;A href="https://security.paloaltonetworks.com/CVE-2023-38802" target="_blank" rel="noopener noreferrer nofollow"&gt;CVE-2023-38802&lt;/A&gt;.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="87.1043px" height="196px"&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="87.1043px" height="196px"&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-release-notes" target="_blank" rel="noopener nofollow noreferrer"&gt;10.2.5&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="97.1236px" height="196px"&gt;8/17/23&lt;/TD&gt;
&lt;TD width="626.852px" height="196px"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;Later release preferred.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;&lt;STRONG&gt;&lt;EM&gt;Note:&amp;nbsp;&lt;/EM&gt;&lt;/STRONG&gt;Denial-of-Service (DoS) Vulnerability in BGP Software (reference&amp;nbsp;&lt;A href="https://security.paloaltonetworks.com/CVE-2023-38802" target="_blank" rel="noopener noreferrer nofollow"&gt;CVE-2023-38802&lt;/A&gt;)&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;Note:&lt;/EM&gt;&lt;/STRONG&gt;&amp;nbsp;On PA-220, installation of PAN-OS 10.2.5 image fails when upgrading from a 10.1 release.&lt;BR /&gt;&lt;EM&gt;Workaround:&lt;/EM&gt;&amp;nbsp;Upgrade the firewall from 10.1 to 10.2.4 before upgrading to 10.2.5. (reference PAN-229865 in&amp;nbsp;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-release-notes/pan-os-10-2-5-known-and-addressed-issues/pan-os-10-2-5-known-issues" target="_blank" rel="noopener noreferrer nofollow"&gt;10.2.5 known issues&lt;/A&gt;)&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="87.1043px" height="86px"&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="87.1043px" height="86px"&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-release-notes" target="_blank" rel="noopener nofollow noreferrer"&gt;10.2.4-h4&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="97.1236px" height="86px"&gt;7/27/23&lt;/TD&gt;
&lt;TD width="626.852px" height="86px"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;Later release preferred.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;&lt;STRONG&gt;&lt;EM&gt;Note:&amp;nbsp;&lt;/EM&gt;&lt;/STRONG&gt;Denial-of-Service (DoS) Vulnerability in BGP Software (reference&amp;nbsp;&lt;A href="https://security.paloaltonetworks.com/CVE-2023-38802" target="_blank" rel="noopener noreferrer nofollow"&gt;CVE-2023-38802&lt;/A&gt;)&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="87.1043px" height="86px"&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="87.1043px" height="86px"&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-release-notes" target="_blank" rel="noopener nofollow noreferrer"&gt;10.2.4-h3&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="97.1236px" height="86px"&gt;7/5/23&lt;/TD&gt;
&lt;TD width="626.852px" height="86px"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;Later release preferred.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;&lt;STRONG&gt;&lt;EM&gt;Note:&amp;nbsp;&lt;/EM&gt;&lt;/STRONG&gt;Denial-of-Service (DoS) Vulnerability in BGP Software (reference&amp;nbsp;&lt;A href="https://security.paloaltonetworks.com/CVE-2023-38802" target="_blank" rel="noopener noreferrer nofollow"&gt;CVE-2023-38802&lt;/A&gt;)&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="87.1043px" height="86px"&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="87.1043px" height="86px"&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-release-notes" target="_blank" rel="noopener nofollow noreferrer"&gt;10.2.4-h2&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="97.1236px" height="86px"&gt;5/17/23&lt;/TD&gt;
&lt;TD width="626.852px" height="86px"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;Later release preferred.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;&lt;STRONG&gt;&lt;EM&gt;Note:&amp;nbsp;&lt;/EM&gt;&lt;/STRONG&gt;Denial-of-Service (DoS) Vulnerability in BGP Software (reference&amp;nbsp;&lt;A href="https://security.paloaltonetworks.com/CVE-2023-38802" target="_blank" rel="noopener noreferrer nofollow"&gt;CVE-2023-38802&lt;/A&gt;)&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="87.1043px" height="142px"&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="87.1043px" height="142px"&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-release-notes" target="_blank" rel="noopener nofollow noreferrer"&gt;10.2.4&lt;/A&gt;&lt;/TD&gt;
&lt;TD width="97.1236px" height="142px"&gt;3/30/23&lt;/TD&gt;
&lt;TD width="626.852px" height="142px"&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;Later release preferred.&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;Note:&lt;/STRONG&gt;&amp;nbsp;&lt;/EM&gt;PA-5450 URL filtering not working when DPC is in slot 2. Workaround is use slots 3-6 for DPCs. Reference PAN-217431 in&amp;nbsp;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-release-notes/pan-os-10-2-4-known-and-addressed-issues/pan-os-10-2-4-h2-addressed-issues" target="_blank" rel="noopener noreferrer nofollow"&gt;10.2.4-h2 addressed issues&lt;/A&gt;.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;SPAN&gt;&lt;STRONG&gt;&lt;EM&gt;Note:&amp;nbsp;&lt;/EM&gt;&lt;/STRONG&gt;Denial-of-Service (DoS) Vulnerability in BGP Software (reference&amp;nbsp;&lt;A href="https://security.paloaltonetworks.com/CVE-2023-38802" target="_blank" rel="noopener noreferrer nofollow"&gt;CVE-2023-38802&lt;/A&gt;)&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD colspan="4" width="898.184px" height="106px"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;</description>
      <pubDate>Thu, 25 Apr 2024 05:00:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/release-date-information/m-p/584879#M3054</guid>
      <dc:creator>PavelK</dc:creator>
      <dc:date>2024-04-25T05:00:57Z</dc:date>
    </item>
  </channel>
</rss>

