- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
Content translations are temporarily unavailable due to site maintenance. We apologize for any inconvenience. Visit our blog to learn more.
01-03-2025 01:17 PM - edited 01-03-2025 01:22 PM
Can anyone share any technical insight into what the attack payload might be or you may be observing in your Threat logs?
We have found some malformed DNS packet sent to port 53 that the FW labels as MS Windows NAT Helper DNS Query DoS Vulnerability (31339)
These packets contain a NULL Pointer Dereference payload that we think is triggering the vulnerabilities.
Any technical insight from the community is appreciated. Thank you.
01-04-2025 12:22 PM
This issue is already resolved.
https://live.paloaltonetworks.com/t5/general-topics/regarding-security-advisory-cve-2024-3393/td-p/9...
https://nvd.nist.gov/vuln/detail/CVE-2024-3393
01-04-2025 02:34 PM
Yup! Yup! I know there’s a fix for these. I’m more interested in what the attack payload is thats causing the NULL pointer bug to trip the process.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!