
Palo Alto Networks Warns of DoS Bug Letting Hackers Disable Firewalls
Why It Matters
A successful exploit could silently knock out critical perimeter defenses, exposing enterprises to broader attacks and operational downtime. Prompt patching is essential to maintain network resilience and compliance for the 70,000‑plus customers relying on Palo Alto’s security stack.
Palo Alto Networks warns of DoS bug letting hackers disable firewalls
Palo Alto Networks patches high‑severity vulnerability that could allow unauthenticated attackers to disable firewall protections
Palo Alto Networks patched a high‑severity vulnerability that could allow unauthenticated attackers to disable firewall protections in denial‑of‑service (DoS) attacks.
Tracked as CVE‑2026‑0227, this security flaw affects next‑generation firewalls (running PAN‑OS 10.1 or later) and Palo Alto Networks' Prisma Access configurations when the GlobalProtect gateway or portal is enabled.
The cybersecurity company says that most cloud‑based Prisma Access instances have already been patched, with those left to be secured already scheduled for an upgrade.
“A vulnerability in Palo Alto Networks PAN‑OS software enables an unauthenticated attacker to cause a denial of service (DoS) to the firewall. Repeated attempts to trigger this issue results in the firewall entering into maintenance mode,” Palo Alto Networks explained.
“We have successfully completed the Prisma Access upgrade for most of the customers, with the exception of few in progress due to conflicting upgrade schedules. Remaining customers are being promptly scheduled for an upgrade through our standard upgrade process.”
Internet security watchdog Shadowserver currently tracks nearly 6,000 Palo Alto Networks firewalls exposed online, though there is no information on how many have vulnerable configurations or have already been patched.

Palo Alto Networks firewalls exposed online (Shadowserver)
When the security advisory was published on Wednesday, the company said it had yet to find evidence that this vulnerability was being exploited in attacks.
Palo Alto Networks has released security updates for all affected versions, and admins are advised to upgrade to the latest release to secure their systems against potential attacks.
| Version | Minor Version | Suggested Solution |
|---|---|---|
| Cloud NGFW All | — | No action needed. |
| PAN‑OS 12.1 | 12.1.0 through 12.1.3 | Upgrade to 12.1.4 or later. |
| PAN‑OS 11.2 | 11.2.8 through 11.2.10 | Upgrade to 11.2.10‑h2 or later. |
| | 11.2.5 through 11.2.7 | Upgrade to 11.2.7‑h8 or 11.2.10‑h2 or later. |
| | 11.2.0 through 11.2.4 | Upgrade to 11.2.4‑h15 or 11.2.10‑h2 or later. |
| PAN‑OS 11.1 | 11.1.11 through 11.1.12 | Upgrade to 11.1.13 or later. |
| | 11.1.7 through 11.1.10 | Upgrade to 11.1.10‑h9 or 11.1.13 later. |
| | 11.1.5 through 11.1.6 | Upgrade to 11.1.6‑h23 or 11.1.13 or later. |
| | 11.1.0 through 11.1.4 | Upgrade to 11.1.4‑h27 or 11.1.13 or later. |
| PAN‑OS 10.2 | 10.2.17 through 10.2.18 | Upgrade to 10.2.18‑h1 or later. |
| | 10.2.14 through 10.2.16 | Upgrade to 10.2.16‑h6 or 10.2.18‑h1 or later. |
| | 10.2.11 through 10.2.13 | Upgrade to 10.2.13‑h18 or 10.2.18‑h1 or later. |
| | 10.2.8 through 10.2.10 | Upgrade to 10.2.10‑h30 or 10.2.18‑h1 or later. |
| | 10.2.0 through 10.2.7 | Upgrade to 10.2.7‑h32 or 10.2.18‑h1 or later. |
| Unsupported PAN‑OS | — | Upgrade to a supported fixed version. |
| Prisma Access 11.2 | 11.2 through — | Upgrade to 11.2.7‑h8 or later. |
| Prisma Access 10.2 | 10.2 through — | Upgrade to 10.2.10‑h29 or later. |
Palo Alto Networks firewalls are often targeted in attacks, frequently using zero‑day vulnerabilities that haven't been disclosed or patched.
-
In November 2024, Palo Alto Networks patched two actively exploited PAN‑OS firewall zero‑days that enabled attackers to gain root privileges. Shadowserver revealed days later that thousands of firewalls had been compromised in the campaign, while CISA ordered federal agencies to secure their devices within three weeks.
-
One month later, in December 2024, the firm warned customers that hackers were exploiting another PAN‑OS DoS vulnerability (CVE‑2024‑3393) to target PA‑Series, VM‑Series, and CN‑Series firewalls with DNS Security logging enabled, forcing them to reboot and disable firewall protections.
-
In February 2025, three other flaws (CVE‑2025‑0111, CVE‑2025‑0108, and CVE‑2024‑9474) were reported as being chained in attacks to compromise PAN‑OS firewalls.
-
More recently, threat‑intelligence company GreyNoise warned of an automated campaign targeting Palo Alto GlobalProtect portals with brute‑force and login attempts from more than 7,000 IP addresses. GlobalProtect is the VPN and remote‑access component of PAN‑OS firewalls, used by many government agencies, service providers, and large enterprises.
Palo Alto Networks' products and services are used by over 70,000 customers worldwide, including most of the largest U.S. banks and 90 % of Fortune 10 companies.
Comments
Want to join the conversation?
Loading comments...