- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
Enhanced Security Measures in Place: To ensure a safer experience, we’ve implemented additional, temporary security measures for all users.
04-15-2024 07:59 AM
Does anyone have a list of release dates for all software update versions of PAN-OS for 11.1 , 11.0 and 10.2? Thank you.
04-15-2024 08:04 AM
this document (customers only) provides you with details on release dates and install recommendations
04-15-2024 08:15 AM
Thank you. Unfortunately my account does not have access to this. Would you be able to post the answer original request?
04-24-2024 10:00 PM
Hello @gundiculous
below are release dates for PAN-OS 11.1, 11.0 and 10.2.
11.1
|
|||
New |
11.1.1-h1 | 04/16/24 |
New release, currently monitoring |
New |
11.1.0-h3 | 04/16/24 |
New release, currently monitoring |
P |
11.1.2-h3 | 04/14/24 |
Preferred Release |
New |
11.1.2-h1 | 03/13/24 |
New release, currently monitoring |
* |
11.1.2 | 02/26/24 |
Later release Preferred |
New |
11.1.0-h2 | 01/08/24 |
New release, currently monitoring |
* |
11.1.1 | 12/26/23 | Later Release Preferred Preferred for Cosmos Platforms (PA-415-5G, PA-5445). Monitoring for other platforms |
New release, currently monitoring. |
|||
New |
11.1.0 | 11/2/23 |
New release, currently monitoring. |
|
|||
New |
11.0.1-h4 | 04/18/24 | New release, currently monitoring Note: Fixed OS Command Injection Vulnerability in GlobalProtect (reference CVE-2024-3400) |
New |
11.0.0-h3 | 04/18/24 | New release, currently monitoring Note: Fixed OS Command Injection Vulnerability in GlobalProtect (reference CVE-2024-3400) |
New |
11.0.4-h2 | 04/17/24 |
New release, currently monitoring. Note: Fixed OS Command Injection Vulnerability in GlobalProtect (reference CVE-2024-3400) |
P |
11.0.3-h10 | 04/16/24 |
New release, currently monitoring. |
New |
11.0.2-h4 | 04/16/24 |
New release, currently monitoring. |
New |
11.0.4-h1 | 4/14/24 |
New release, currently monitoring. |
New |
11.0.4 | 4/08/24 |
New release, currently monitoring |
* |
11.0.3-h5 | 02/22/24 |
Later release preferred (affected by OS Command Injection Vulnerability in GlobalProtect (reference CVE-2024-3400)) |
* |
11.0.3-h3 | 01/16/24 |
Later release preferred
Note: GlobalProtect tunnel might disconnect shortly after being established when SSL is used as a transport protocol. Workaround: Disable Internet Protocol Version 6 (TCP/IPv6) on the PANGP Virtual Network Adapter.
Note: The GlobalProtect app cannot connect to a portal or gateway and GlobalProtect Clientless VPN users cannot access applications if authentication takes longer than 20 seconds. Workaround: Increase the TCP handshake timeout to the maximum value of 60 seconds (reference PAN-227368).
Note: Scheduled Antivirus updates failed when external dynamic lists were configured on the firewall. (reference PAN-220659).
Note: Tabs in the ACC such as Network Activity, Threat Activity, and Blocked Activity do not display data when you applied a Time filter of Last 15 Minutes, Last Hour, Last 6 Hours, or Last 12 Hours, and the data that was displayed with the Last 24 Hours filter was not accurate. Reports that were run against summary logs also did not display accurate results (reference PAN-234929). |
New |
11.0.2-h3 | 01/10/24 |
New release, currently monitoring Note: PAN-OS Certificate Expirations and New, Comprehensive Certificate Management Process (reference Customer Advisory) |
New |
11.0.1-h3 | 01/08/24 |
New release, currently monitoring |
New |
11.0.0-h2 | 01/08/24 |
New release, currently monitoring |
New |
11.0.0-h1 | 11/7/23 |
New release, currently monitoring. |
New |
11.0.3 | 11/7/23 |
Note: A memory leak in the logrcvr process may cause the firewall to be unstable. |
* |
11.0.2-h2 | 9/21/23 |
Later release preferred. Note: Denial-of-Service (DoS) Vulnerability in BGP Software (reference CVE-2023-38802) |
* |
11.0.2-h1 | 8/17/23 |
Multiple issues addressed in 11.0.2-h2. (reference 11.0.2-h2 addressed issues) |
* |
11.0.2 | 6/29/23 |
Multiple issues addressed in 11.0.2-h2. (reference 11.0.2-h2 addressed issues) Note: Denial-of-Service (DoS) Vulnerability in BGP Software (reference CVE-2023-38802) |
* |
11.0.1-h2 | 5/31/23 |
Multiple issues addressed in 11.0.2. (reference 11.0.2 addressed issues) Note: Denial-of-Service (DoS) Vulnerability in BGP Software (reference CVE-2023-38802) |
* |
11.0.1 | 3/30/23 |
Multiple issues addressed in 11.0.1-h2. (reference 11.0.1-h2 addressed issues) Note: Denial-of-Service (DoS) Vulnerability in BGP Software (reference CVE-2023-38802) |
|
|||
New |
10.2.1-h2 | 04/18/24 | New release, currently monitoring Note: Fixed OS Command Injection Vulnerability in GlobalProtect (reference CVE-2024-3400) |
New |
10.2.0-h3 | 04/18/24 | New release, currently monitoring Note: Fixed OS Command Injection Vulnerability in GlobalProtect (reference CVE-2024-3400) |
New |
10.2.4-h16 | 04/18/24 | New release, currently monitoring Note: Fixed OS Command Injection Vulnerability in GlobalProtect (reference CVE-2024-3400) |
New |
10.2.3-h13 | 04/18/24 | New release, currently monitoring Note: Fixed OS Command Injection Vulnerability in GlobalProtect (reference CVE-2024-3400) |
New |
10.2.2-h5 | 04/18/24 | New release, currently monitoring Note: Fixed OS Command Injection Vulnerability in GlobalProtect (reference CVE-2024-3400) |
New |
10.2.5-h6 | 04/16/24 | New release, currently monitoring Note: Fixed OS Command Injection Vulnerability in GlobalProtect (reference CVE-2024-3400) |
New |
10.2.6-h3 | 04/15/24 |
New release, currently monitoring |
P |
10.2.8-h3 | 04/15/24 |
Preferred release |
New |
10.2.7-h8 | 04/15/24 |
New release, currently monitoring |
New |
10.2.9-h1 | 04/14/24 |
New release, currently monitoring. |
10.2.9 | 04/01/24 |
New release |
|
* |
10.2.8 | 02/12/24 |
Later release preferred |
* |
10.2.7-h6 | 03/04/24 |
Later release preferred |
* |
10.2.6-h1 | 01/08/24 |
Note: PAN-OS Certificate Expirations and New, Comprehensive Certificate Management Process (reference Customer Advisory) |
* |
10.2.4-h10 | 01/08/24 |
Note: PAN-OS Certificate Expirations and New, Comprehensive Certificate Management Process (reference Customer Advisory) |
* |
10.2.3-h12 | 02/28/24 |
Note: PAN-OS Certificate Expirations and New, Comprehensive Certificate Management Process (reference Customer Advisory) |
* |
10.2.3-h11 | 01/08/24 |
Note: PAN-OS Certificate Expirations and New, Comprehensive Certificate Management Process (reference Customer Advisory) Note: Traffic through a PA-3400 series device may stop completely after upgrading/downgrading from PAN-OS 10.2.3-h9/10.2.3-h11 to any PAN-OS version, including reinstalling the same version. If a firewall has not been upgraded to PAN-OS 10.2.3-h9/10.2.3-h11, do not upgrade to any of these two versions, but install directly PAN-OS 10.2.3-h12. If a firewall has already been upgraded to PAN-OS 10.2.3-h9/10.2.3-h11, then perform a reboot before upgrading to any release (reference Knowledge Base Article). |
* |
10.2.2-h4 | 01/08/24 |
Note: PAN-OS Certificate Expirations and New, Comprehensive Certificate Management Process (reference Customer Advisory) |
* |
10.2.1-h1 | 01/08/24 |
Note: PAN-OS Certificate Expirations and New, Comprehensive Certificate Management Process (reference Customer Advisory) |
* |
10.2.0-h2 | 01/08/24 |
Note: PAN-OS Certificate Expirations and New, Comprehensive Certificate Management Process (reference Customer Advisory) |
* |
10.2.7-h3 | 12/18/23 |
Later release preferred. Note: Addresses PAN-234929 (reference 10.2.7-h3 Addressed Issues) Note: GlobalProtect tunnel might disconnect shortly after being established when SSL is used as a transport protocol. Workaround: Disable Internet Protocol Version 6 (TCP/IPv6) on the PANGP Virtual Network Adapter. |
|
10.2.7-h1 | 11/22/23 |
Later release preferred. Note: Emergency Update Required - PAN-OS Root and Default Certificate Expiration (reference Customer Advisory) |
|
10.2.7 | 11/9/23 |
Later release preferred. Note: The tabs in the ACC, such as Network Activity, Threat Activity, Blocked Activity etc. might be blank when you apply a Time filter for the Last 15 Minutes, Last Hour, Last 6 Hours, or Last 12 Hours. With a Last 24 Hours Time filter, the data displayed might not be accurate. Additionally, reports run against summary logs might not display accurate results (reference PAN-234929 in 10.2.7 known issues). |
|
10.2.3-h9 | 11/7/23 |
Later release preferred. Note: Traffic through a PA-3400 series device may stop completely after upgrading/downgrading from PAN-OS 10.2.3-h9/10.2.3-h11 to any PAN-OS version, including reinstalling the same version. If a firewall has not been upgraded to PAN-OS 10.2.3-h9/10.2.3-h11, do not upgrade to any of these two versions, but install directly PAN-OS 10.2.3-h12. If a firewall has already been upgraded to PAN-OS 10.2.3-h9/10.2.3-h11, then perform a reboot before upgrading to any release (reference Knowledge Base Article). |
|
10.2.6 | 9/27/23 |
Later release preferred. Note: The tabs in the ACC, such as Network Activity, Threat Activity, Blocked Activity etc might be blank when you apply a Time filter for the Last 15 Minutes, Last Hour, Last 6 Hours, or Last 12 Hours. With a Last 24 Hours Time filter, the data displayed might not be accurate. Additionally, reports run against summary logs might not display accurate results (reference PAN-234929 in 10.2.6 known issues). |
|
10.2.5 | 8/17/23 |
Later release preferred. Note: Denial-of-Service (DoS) Vulnerability in BGP Software (reference CVE-2023-38802) |
|
10.2.4-h4 | 7/27/23 |
Later release preferred. Note: Denial-of-Service (DoS) Vulnerability in BGP Software (reference CVE-2023-38802) |
|
10.2.4-h3 | 7/5/23 |
Later release preferred. Note: Denial-of-Service (DoS) Vulnerability in BGP Software (reference CVE-2023-38802) |
|
10.2.4-h2 | 5/17/23 |
Later release preferred. Note: Denial-of-Service (DoS) Vulnerability in BGP Software (reference CVE-2023-38802) |
|
10.2.4 | 3/30/23 |
Later release preferred. Note: Denial-of-Service (DoS) Vulnerability in BGP Software (reference CVE-2023-38802) |
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!